Version 6.12.14 2024-11-26
Changes vs. 6.12.13
This release includes important bug fixes and security updates.
ALL USERS ARE STRONGLY ENCOURAGED TO UPGRADE
Update Notes
New Windows changes may result in loss of access to Public shares
Due to recent security changes in Windows, "guest" access of Unraid Public shares may not work. The easiest way around this is to create a user in Unraid with the same name as the Windows account you are using to connect. If the Unraid user password is not the same as the Windows account password, Windows will prompt for credentials.
If you are using a Microsoft account, it may be better to create a user in Unraid with a simple username, set a password, then in Windows go to Control Panel -> Credential Manager -> Windows credentials -> Add a Windows Credential and add the correct Unraid server name and credentials.
Alternately you can re-enable Windows guest fallback (not recommended).
Bug fixes and improvements
- emhttpd: Fix swap-disable operation not properly clearing remaining space on target
- ShareList: present indicator when a share primary pool is invalid, for example, has been renamed or deleted.
- ShareEdit: warn user that renaming a pool could affect shares which use that pool.
- DiskSettings: clarify that "default file system" applies to unRAID array disks.
- Remove ps.txt from diagnostics so as not to expose container VPN credentials.
- Add security warnings about Windows Server signing.
- Update Feedback form and require email address
- Fixed link to apcupsd manual on Settings > UPS Settings page
- Fixed link to btrfs man-page in Help text
- rc.docker - Make sure that custom interfaces with a higher index then 0 are properly rebuilt
- rc.rsyslogd: use pgrep, killall with PID namespace.
- webGUI: improved handling of http query parameters
Linux kernel
- version 6.1.118
Base distro
- firefox: version 132.0.r20241110231641 (AppImage) (CVE-2024-11691 - 11699)
- intel-microcode: version 20241112
- libssh: version 0.10.6
- libssh2: version 1.11.1 (CVE-2023-48795)
- openssl: version 1.1.1zb (CVE-2024-9143)
- php: version 8.2.26 Multiple CVE
- samba: version 4.19.9 (CVE-2018-14628)
- wget: version 1.25.0 (CVE-2024-10524)