/[smeserver]/cdrom.image/sme8/README.txt
ViewVC logotype

Diff of /cdrom.image/sme8/README.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph | View Patch Patch

Revision 1.1 by slords, Sat Jun 6 23:51:54 2009 UTC Revision 1.36 by vip-ire, Thu Sep 24 10:35:43 2015 UTC
# Line 1  Line 1 
1  SME Server 7.3 Release Notes  Koozali SME Server 8.2 RC2 Release Announcement
2  ============================  
3    Koozali SME Server 8.2 RC2 Release Notes
4  January 1 2008  ==========================================
5    24 Sept 2015
6  The SME Server development team is pleased to announce the release of  
7  SME Server 7.3. This release is based on CentOS 4.6 and all packages  The Koozali SME Server (SME Server) development team is pleased to announce
8  have been updated to the latest releases.  the release of SME Server 8.2 Release Candidate 2 which is based on CentOS 5.11
9    
10    Bug reports and reports of potential bugs should be raised in the bug
11  All SME Server users should upgrade to this release.  tracker (and only there, please);
12    
13        http://bugs.contribs.org/
14  Bug reports and reports of potential bugs should be raised  
15  in the bug tracker (and only there, please);  Download
16    ========
17      http://bugs.contribs.org/  You can download SME Server 8.2rc2  from
18    http://mirror.contribs.org/smeserver/releases/testing/8.2rc2/
19    or for other methods see http://wiki.contribs.org/SME_Server:Download
20  About SME Server  
21  ================  Please note it may take up to 48 hours for mirrors to finish syncing,
22    during this time you may experience problems.
23  SME Server is the leading Linux distribution for small and medium  
24  enterprises. SME Server is brought to you by SME Server, Inc.  About SME Server
25  ( http://www.smeserver.org/ ), a non-profit corporation that exists to  ================
26  provide marketing and legal support for SME Server.  SME Server is the leading Linux distribution for small and medium
27    enterprises. SME Server is brought to you by Koozali Foundation, Inc.,
28  SME Server is freely available under the GNU General Public License  a non-profit corporation that exists to provide marketing and legal support
29  and is only possible through the efforts of the SME Server community.  for SME Server.
30  However, the availability and quality of SME Server is dependent on  
31  meeting our expenses, such as hosting costs, server hardware, etc.  SME Server is freely available under the GNU General Public License and
32    is only possible through the efforts of the SME Server community.
33  As such, we ask for a small donation to offset costs and fund further  However, the availability and quality of SME Server is dependent on
34  development.  meeting our expenses, such as hosting costs, server hardware, etc.
35    
36  Please visit http://www.smeserver.org/donate/ to donate.  As such, we ask for a donation to offset costs and fund further development.
37    
38    a) If you are a school, a church, a non-profit organisation or an individual
39  Thanks  using SME Server for private purposes, we would appreciate you to contribute
40  ------  within your means toward the costs associated with hosting, maintenance and
41  The development team would like to thank all of those involved in  development.
42  this release. However, this distribution cannot continue with the  
43  current level of support. More people are required to help with  b) If you are a company or an integrator and you are deploying SME Server in
44  bug triage and verification testing.  the course of your work to generate revenue, we expect you to make a donation
45    commensurate with the level of revenue you generate and the number of servers
46    your have in the field. Please, help the project
47  This release contains many new features, all released updates for  
48  SME Server 7.2 and fixes for many reported problems. Upgrades  Please visit http://wiki.contribs.org/Donate to donate.
49  will be available by CD, the Software Installer and command line.  
50    Koozali Inc is happy to supply an invoice for any donations received,
51    simply email treasurer@koozali.org
52  Upgrades  
53  ========  Thanks
54    ======
55  - Always perform a backup prior to major system upgrades  The development team would like to thank all of those who have involved
56    themselves with this release.
57  - An upgrade will preserve the existing data  
58    Notes
59    =====
60  Changes in this release  
61  =======================  1. CentOS 5 has dropped support for i586 and therefore SME Server 8.2
62       will not work on i586 hardware. [See bugzilla:2845]. i586 hardware
63       means processors before and including Intel Pentium, Pentium MMX;
64  Installer Options     AMD K5, K6, K6-II, K6-III and Via C3. i686 architecture processors
65  -----------------     are Intel Pentium Pro, Pentium II, Pentium III; AMD Athlon,
66  - Using "sme multipart" boot parameter now enables quotas on all LVM's     Athlon XP and later.
67    see bug 3651 on how to create your quota files  
68    2. Some notes on SME Server 8.2 including help on upgrades can be found at
69       http://wiki.contribs.org/SME_Server_8
70  Other mail system changes  
71  -------------------------  3. Please note Upstream policy on Production Phase 3 for EL5. Only those
72  - Support for disconnect option in rhsbl plugin     security updates deemed crucial are now being released upstream for EL5
73  - Support for disconnect immediately if dnsbl plugin rejects recipient     (so also for SME8) The Koozali team recommends that you start moving
74    addresses     workloads from SME Server 8 to SME Server 9.
75  - Newer version of ipsvd to resolve a few Thunderbird issues     Planned EOL for CentOS 5 is Mar 31 2017
76  - Support for configurable timeouts which by default is set to two minutes  
77    4. Please note it may take up to 48 hours for mirrors to finish syncing,
78       during this time you may experience problems.
79  Console     You can download SME Server 8.2 from
80  -------     http://mirror.contribs.org/smeserver/releases/testing/8.2rc/
81  - Now able to remove Corporate DNS setting    
82  - Raid reconstruction now finishes after using "sme nolvm" passed at install  Major changes in this release
83    time  =============================
84    Switch back to upstream openssl builds
85    Modify whitelist_soft transaction to interact with dnsbl filter
86  Backups  Added Windows 10 support to SME Domain
87  -------  
88  - Ability to use console restore with CD or DVD recordable media  Changes in this release
89  - Remove smbpasswd file prior to restore  =======================
90    Packages altered by Centos, Redhat, and Fedora-associated developers are
91    not included.
92  Localisation  
93  ------------  Backups
94  - The fr-fr browser language is now supported  -------
95  - Italian translation minor update   - Add pkgconfig dar
96     - New Upstream Version of dar
97     - Add requires nfs-utils
98  Software Installer   - The nfs service is neither started or allowed to start
99  ------------------   - Workstation Backup, do not create folder in /
100  - The voxteneo.com and fullnet.co.uk mirrors has been added as a mirror  
101    location. Many thanks to all of our mirrors  File Server
102  - Removed planetmirror mirror due to being unstable for a number of months  -----------
103  - Added smecontribs repository to smeserver   - added W10 support to SME Domain
104     - e-smith-samba-2.2.0.bz9028.W10_registry.patch
105     - Fix samba audit parameters Patch from Jorge Gonzalez
106  Webmail  
107  -------  
108  - Horde, imp, turbo and ingo have been updated to the latest versions  LDAP
109    ----
110     - Make pdbedit output independent from locale and timezone so it can be
111  Server manager     parsed
112  --------------  
113  - Updated wording in Server manager > proxy to be correct when running in  Localisation
114    serveronly mode  ------------
115  - Now able to remove settings in the Corporate DNS panel   - apply locale 2015-03-14 patch from pootle
116  - Make qpsmtpd/state visible in the view log files   - apply locale 2014-12-25 patch from pootle
117  - Convert squid timestamp in view log files   - apply locale 2014-03-08 patch from pootle
118  - Since we moved to session-based login changing admin password does no  
119    longer invalidate access to server manager  Mail Server
120  - Added support if you use port-forwarding with an external dynamic ip  -----------
121    address   - Updated to ClamAV release 0.98.7
122     - Add BuildRequires for openssl-devel and libxml2-devel
123     - Remove Packager and Vendor from ClamAV spec file.
124  Other fixes and updates   - Remove the patch e-smith-email-5.2.0-UEsDBBQDAAAIA-new-signature.patch
125  -----------------------   - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA
126  - More changes have been made in preparation for migration to CentOS5   - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3
127  - Various samba issues fixed with new samba 3.0.25b package   - Fix stunnel path
128  - Smartd is disabled by default but has built in templates to enable   - Use stunnel instead of sslio to support TLS
129  - Import of spamassassin keys are now processed correctly   - Modify whitelist_soft transaction to interact with dnsbl filter
130  - Fixed various log noise issues     by John Crisp <jcrisp@safeandsoundit.co.uk>
131  - Allow root to be key based login only   - Remove DENYSOFT on SPF softfail qpsmtpd
132  - Increased dnscache forwarder cache size   - Increase MemLimit to 700M for clamav-0.98
133  - Freshclam permissions now corrected   - Remove dnsbl.ahbl.org RBL List
134  - Unwanted symlinks in httpd log directory no longer appear  
135  - Added WPAD feature in DHCP  Server manager
136  - Fixed various perl issues  --------------
137  - Using long email address now stops regeneration email every day   - Resync with upstream php53, which include
138        fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
139        xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
140  General features      core: fix integer overflow in unserialize() CVE-2014-3669
141  ================      exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
142     - Resync with upstream php53, which include
143  - Based on CentOS 4.6 and all available updates      spl: fix use-after-free in ArrayIterator due to object
144        change during sorting. CVE-2014-4698
145        spl: fix use-after-free in SPL Iterators. CVE-2014-4670
146  There are a few differnces from previous releases <=7.2      gd: fix NULL pointer dereference in gdImageCreateFromXpm.
147  ======================================================================      CVE-2014-2497
148        fileinfo: fix incomplete fix for CVE-2012-1571 in
149        cdf_read_property_info. CVE-2014-3587
150  After installing for the very first time:      core: fix incomplete fix for CVE-2014-4049 DNS TXT
151  -----------------------------------------      record parsing. CVE-2014-3597
152  - First night you should receive an email from cron about sa_updates.   - Resync with upstream php53, which include
153  - First night you should receive a large email saying a bunch of      core: type confusion issue in phpinfo(). CVE-2014-4721
154    groups/users were removed/added (rkhunter email notification).      date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712
155  - Any time you change users/groups you will receive an email the next day      core: fix heap-based buffer overflow in DNS TXT record parsing.
156    about those changes (rkhunter email notification).      CVE-2014-4049
157        core: unserialize() SPL ArrayObject / SPLObjectStorage type
158        confusion flaw. CVE-2014-3515
159  Taking the upgrade path from a 7.x to 7.3      fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270
160  -----------------------------------------      fileinfo: unrestricted recursion in handling of indirect type
161  - First night you may receive an email from cron about sa_updates      rules. CVE-2014-1943
162  - First night you may receive a email saying missing passwd/group files      fileinfo: out of bounds read in CDF parser. CVE-2012-1571
163    (rkhunter email notification).      fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479
164        fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480
165  $Id: README.txt,v 1.20 2008/01/01 17:18:13 slords Exp $      fileinfo: cdf_unpack_summary_info() excessive looping
166        DoS. CVE-2014-0237
167        fileinfo: CDF property info parsing nelements infinite
168        loop. CVE-2014-0238
169    
170    Web Server
171    ----------
172     - Disable SSLv3
173     - Revert CRIME mitigation patch, as it's not needed
174     - Mitigate CRIME, CVE-2012-4929
175    
176    Other fixes and updates
177    -----------------------
178     - Only fire the ip-change event when IP is assigned to WAN nic
179       (Code by Charlie Brady and John Crisp)  
180     - When quiting the console app with unsaved changes set the default selected
181       answer to NO
182     - Add a verification in the console of number of pptp clients against ip allowed in dhcpd
183     - Add a verification in remoteaccess panel of number of pptp clients against ip allowed in dhcpd
184     - Reset primary ibay default type
185     - Add a migrate fragment to sanitize the host comment for illegal characters in the server-manager.
186       Sanitize existing hostname records, Add a validator for the comment in the hostname field
187       Code done by Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>
188       and Huib <sme@artixdesign.com>
189     - Force SSL following ibays settings to the relevant domain
190     - Move mysql logging to multilog
191     - Allow ntp status queries from localhost.
192     - Avoid uninitialized variable warning from last update.
193     - Add ssh-autoblock for external interface - patch by Chris Maltby
194     - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252
195     - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the
196       CVE-2012-3478 and CVE-2012-2252 fixes.
197     - Updated makefile.patch to preserve RPM CFLAGS.
198     - Added command-line-error.patch (from Debian), correcting error message
199       generated when insecure command line option is used (CVE-2012-3478 fix
200       regression).
201     - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
202     - Add patch for rsync3 compat (#485946)
203     - Update smeserver-release for beta1 of SME Server 8.2
204     - Set the check update frequency of smecontribs through the server-manager
205     - Add a default Yum db property for check4contribsupdates
206     - Added a check-update for the smecontribs repository
207    
208    
209    General features
210    ================
211    
212    - Based on CentOS 5.11 and all available updates
213    
214    Terry Fage
215    On behalf of the SME Server development team


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed