/[smeserver]/cdrom.image/sme8/README.txt
ViewVC logotype

Contents of /cdrom.image/sme8/README.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.36 - (show annotations) (download)
Thu Sep 24 10:35:43 2015 UTC (9 years, 3 months ago) by vip-ire
Branch: MAIN
Changes since 1.35: +21 -18 lines
Content type: text/plain
Update release notes for 8.2rc2

1 Koozali SME Server 8.2 RC2 Release Announcement
2
3 Koozali SME Server 8.2 RC2 Release Notes
4 ==========================================
5 24 Sept 2015
6
7 The Koozali SME Server (SME Server) development team is pleased to announce
8 the release of SME Server 8.2 Release Candidate 2 which is based on CentOS 5.11
9
10 Bug reports and reports of potential bugs should be raised in the bug
11 tracker (and only there, please);
12
13 http://bugs.contribs.org/
14
15 Download
16 ========
17 You can download SME Server 8.2rc2 from
18 http://mirror.contribs.org/smeserver/releases/testing/8.2rc2/
19 or for other methods see http://wiki.contribs.org/SME_Server:Download
20
21 Please note it may take up to 48 hours for mirrors to finish syncing,
22 during this time you may experience problems.
23
24 About SME Server
25 ================
26 SME Server is the leading Linux distribution for small and medium
27 enterprises. SME Server is brought to you by Koozali Foundation, Inc.,
28 a non-profit corporation that exists to provide marketing and legal support
29 for SME Server.
30
31 SME Server is freely available under the GNU General Public License and
32 is only possible through the efforts of the SME Server community.
33 However, the availability and quality of SME Server is dependent on
34 meeting our expenses, such as hosting costs, server hardware, etc.
35
36 As such, we ask for a donation to offset costs and fund further development.
37
38 a) If you are a school, a church, a non-profit organisation or an individual
39 using SME Server for private purposes, we would appreciate you to contribute
40 within your means toward the costs associated with hosting, maintenance and
41 development.
42
43 b) If you are a company or an integrator and you are deploying SME Server in
44 the course of your work to generate revenue, we expect you to make a donation
45 commensurate with the level of revenue you generate and the number of servers
46 your have in the field. Please, help the project
47
48 Please visit http://wiki.contribs.org/Donate to donate.
49
50 Koozali Inc is happy to supply an invoice for any donations received,
51 simply email treasurer@koozali.org
52
53 Thanks
54 ======
55 The development team would like to thank all of those who have involved
56 themselves with this release.
57
58 Notes
59 =====
60
61 1. CentOS 5 has dropped support for i586 and therefore SME Server 8.2
62 will not work on i586 hardware. [See bugzilla:2845]. i586 hardware
63 means processors before and including Intel Pentium, Pentium MMX;
64 AMD K5, K6, K6-II, K6-III and Via C3. i686 architecture processors
65 are Intel Pentium Pro, Pentium II, Pentium III; AMD Athlon,
66 Athlon XP and later.
67
68 2. Some notes on SME Server 8.2 including help on upgrades can be found at
69 http://wiki.contribs.org/SME_Server_8
70
71 3. Please note Upstream policy on Production Phase 3 for EL5. Only those
72 security updates deemed crucial are now being released upstream for EL5
73 (so also for SME8) The Koozali team recommends that you start moving
74 workloads from SME Server 8 to SME Server 9.
75 Planned EOL for CentOS 5 is Mar 31 2017
76
77 4. Please note it may take up to 48 hours for mirrors to finish syncing,
78 during this time you may experience problems.
79 You can download SME Server 8.2 from
80 http://mirror.contribs.org/smeserver/releases/testing/8.2rc/
81
82 Major changes in this release
83 =============================
84 Switch back to upstream openssl builds
85 Modify whitelist_soft transaction to interact with dnsbl filter
86 Added Windows 10 support to SME Domain
87
88 Changes in this release
89 =======================
90 Packages altered by Centos, Redhat, and Fedora-associated developers are
91 not included.
92
93 Backups
94 -------
95 - Add pkgconfig dar
96 - New Upstream Version of dar
97 - Add requires nfs-utils
98 - The nfs service is neither started or allowed to start
99 - Workstation Backup, do not create folder in /
100
101 File Server
102 -----------
103 - added W10 support to SME Domain
104 - e-smith-samba-2.2.0.bz9028.W10_registry.patch
105 - Fix samba audit parameters Patch from Jorge Gonzalez
106
107
108 LDAP
109 ----
110 - Make pdbedit output independent from locale and timezone so it can be
111 parsed
112
113 Localisation
114 ------------
115 - apply locale 2015-03-14 patch from pootle
116 - apply locale 2014-12-25 patch from pootle
117 - apply locale 2014-03-08 patch from pootle
118
119 Mail Server
120 -----------
121 - Updated to ClamAV release 0.98.7
122 - Add BuildRequires for openssl-devel and libxml2-devel
123 - Remove Packager and Vendor from ClamAV spec file.
124 - Remove the patch e-smith-email-5.2.0-UEsDBBQDAAAIA-new-signature.patch
125 - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA
126 - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3
127 - Fix stunnel path
128 - Use stunnel instead of sslio to support TLS
129 - Modify whitelist_soft transaction to interact with dnsbl filter
130 by John Crisp <jcrisp@safeandsoundit.co.uk>
131 - Remove DENYSOFT on SPF softfail qpsmtpd
132 - Increase MemLimit to 700M for clamav-0.98
133 - Remove dnsbl.ahbl.org RBL List
134
135 Server manager
136 --------------
137 - Resync with upstream php53, which include
138 fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
139 xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
140 core: fix integer overflow in unserialize() CVE-2014-3669
141 exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
142 - Resync with upstream php53, which include
143 spl: fix use-after-free in ArrayIterator due to object
144 change during sorting. CVE-2014-4698
145 spl: fix use-after-free in SPL Iterators. CVE-2014-4670
146 gd: fix NULL pointer dereference in gdImageCreateFromXpm.
147 CVE-2014-2497
148 fileinfo: fix incomplete fix for CVE-2012-1571 in
149 cdf_read_property_info. CVE-2014-3587
150 core: fix incomplete fix for CVE-2014-4049 DNS TXT
151 record parsing. CVE-2014-3597
152 - Resync with upstream php53, which include
153 core: type confusion issue in phpinfo(). CVE-2014-4721
154 date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712
155 core: fix heap-based buffer overflow in DNS TXT record parsing.
156 CVE-2014-4049
157 core: unserialize() SPL ArrayObject / SPLObjectStorage type
158 confusion flaw. CVE-2014-3515
159 fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270
160 fileinfo: unrestricted recursion in handling of indirect type
161 rules. CVE-2014-1943
162 fileinfo: out of bounds read in CDF parser. CVE-2012-1571
163 fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479
164 fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480
165 fileinfo: cdf_unpack_summary_info() excessive looping
166 DoS. CVE-2014-0237
167 fileinfo: CDF property info parsing nelements infinite
168 loop. CVE-2014-0238
169
170 Web Server
171 ----------
172 - Disable SSLv3
173 - Revert CRIME mitigation patch, as it's not needed
174 - Mitigate CRIME, CVE-2012-4929
175
176 Other fixes and updates
177 -----------------------
178 - Only fire the ip-change event when IP is assigned to WAN nic
179 (Code by Charlie Brady and John Crisp)
180 - When quiting the console app with unsaved changes set the default selected
181 answer to NO
182 - Add a verification in the console of number of pptp clients against ip allowed in dhcpd
183 - Add a verification in remoteaccess panel of number of pptp clients against ip allowed in dhcpd
184 - Reset primary ibay default type
185 - Add a migrate fragment to sanitize the host comment for illegal characters in the server-manager.
186 Sanitize existing hostname records, Add a validator for the comment in the hostname field
187 Code done by Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>
188 and Huib <sme@artixdesign.com>
189 - Force SSL following ibays settings to the relevant domain
190 - Move mysql logging to multilog
191 - Allow ntp status queries from localhost.
192 - Avoid uninitialized variable warning from last update.
193 - Add ssh-autoblock for external interface - patch by Chris Maltby
194 - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252
195 - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the
196 CVE-2012-3478 and CVE-2012-2252 fixes.
197 - Updated makefile.patch to preserve RPM CFLAGS.
198 - Added command-line-error.patch (from Debian), correcting error message
199 generated when insecure command line option is used (CVE-2012-3478 fix
200 regression).
201 - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
202 - Add patch for rsync3 compat (#485946)
203 - Update smeserver-release for beta1 of SME Server 8.2
204 - Set the check update frequency of smecontribs through the server-manager
205 - Add a default Yum db property for check4contribsupdates
206 - Added a check-update for the smecontribs repository
207
208
209 General features
210 ================
211
212 - Based on CentOS 5.11 and all available updates
213
214 Terry Fage
215 On behalf of the SME Server development team

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed