Unraid OS Version 6.10.2 Now Available
Unraid 6.10.2 contains security and bug fixes and minor improvements.
This release contains security fixes, a Data Corruption mitigation, bug fixes, and other minor improvements.
To upgrade:
- First, create a backup of your USB flash boot device: Main/Flash/Flash Backup
- If you are running any 6.4 or later release, click "Check for Updates" on the Tools/Update OS page.
- If you are running a pre-6.4 release, click 'Check for Updates' on the Plugins page.
If the above doesn't work, navigate to Plugins/Install Plugin, select/copy/paste this plugin URL and click Install:
https://unraid-dl.sfo2.cdn.digitaloceanspaces.com/stable/unRAIDServer.plg
Bugs: If you discover a bug or other issue in this release, please open a Stable Releases Bug Report.
Thank you to all Moderators, Community Developers, and Community Members for reporting bugs, providing information, and posting workarounds.
Please remember to make a flash backup!
Data Corruption Possible with tg3 Driver when Intel VT-d is Enabled:
The combination of the Linux 5.15 kernel, tg3 driver, and Intel VT-d enabled appears to be causing data corruption. This has been verified on several platforms, including a Broadcom NetXtreme Gigabit Ethernet NIC (note: there maybe others). This release includes the following workaround:
Very early in server startup (rc.S) if Intel VT-d is detected enabled, then the script will unconditionally create the file:
/etc/modprobe.d/tg3.conf
with the following content:
blacklist tg3
Hence by default, if VT-d is enabled, which is to say, it has not been disabled in either bios or via kernel "intel_iommu=off", then we are going to blacklist the tg3 driver on all platforms.
What if someone has a platform where tg3 does not give them any trouble with VT-d enabled? In this case, they must create an empty file on their flash device:
config/modprobe.d/tg3.conf
When the startup sequence continues it will get to the point where it executes:
install -p -m 0644 /boot/config/modprobe.d/* /etc/modprobe.d
A blank tg3.conf file stored on the flash then effectively un-blacklists it.
There will be users who will lose network connectivity because their NIC is blacklisted. If you are running on a problematic platform you should go into your bios and disable VT-d. If this is a platform without issue, then you will need to create the blank tg3.conf file on your flash config/modprobe.d directory.
It may take some time to identify and integrate a proper fix for this issue, at which point we will remove the auto-blacklisting code. I want to thank @JorgeB for his incredible help in identifying and isolating this issue.
Security-related Changes
- The Firefox browser has been updated to version 100.0.2 to address a very nasty security vulnerability. If you use Firefox we also suggest upgrading on all platforms.
- We fixed an issue where webGUI login could accept a password from a user other than 'root', if that username included the string 'root'.
- The Linux kernel was updated to 5.15.43 to address a "security bypass" vulnerability.
Other Changes
- On the Management Access page, for the "Use SSL/TLS" setting we changed the word "Auto" to "Strict" in the drop-down menu. This better describes the action of this setting.
- Docker manager now uses Docker label for icons as a fallback.
- VM manager now gives the option of using LibVirt networks in addition to bridges without having to edit the VM's XML.
- Improved handling of custom SSL certificates.
- [6.10.1] Fix regression: support USB flash boot from other than partition 1
- other misc. bug fixes
Please see the full release post
to see the full change log.