/[smeserver]/cdrom.image/sme9/README.txt
ViewVC logotype

Diff of /cdrom.image/sme9/README.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph | View Patch Patch

Revision 1.17 by vip-ire, Tue Nov 10 09:47:06 2015 UTC Revision 1.25 by unnilennium, Mon Mar 27 22:09:55 2017 UTC
# Line 1  Line 1 
1  Koozali SME Server 9.1 RC1 Release Announcement  Koozali SME Server 9.2 Final Release Notes
2    ===========================================
3  Koozali SME Server 9.1 RC1 Release Notes  
4  ===========================================  31 March 2017
5  10th Nov 2015  
6    The Koozali SME Server (SME Server) development team is pleased to announce
7  The Koozali SME Server (SME Server) development team is pleased to announce  the release of SME Server 9.2 Final which is based on CentOS 6.8
8  the release of SME Server 9.1 RC1 which is based on CentOS 6.7.  
9    Bug reports and reports of potential bugs should be raised in the bug
10  Bug reports and reports of potential bugs should be raised in the bug  tracker (and only there, please);
11  tracker (and only there, please);  
12        http://bugs.contribs.org/
13      http://bugs.contribs.org/  
14    Download
15  Download  ========
16  ========  
17  You can download SME Server 9.1 RC1 from  You can download Koozali SME Server 9.2 Final from
18  http://mirror.contribs.org/smeserver/releases/testing/9.1.rc1/  http://mirror.contribs.org/smeserver/releases/9.2/
19  or for other methods see http://wiki.contribs.org/SME_Server:Download  or for other methods see http://wiki.contribs.org/SME_Server:Download
20    
21  Please note it may take up to 48 hours for mirrors to finish syncing,  Please note it may take up to 48 hours for mirrors to finish syncing,
22  during this time you may experience problems.  during this time you may experience problems.
23    
24  About SME Server  About SME Server
25  ================  ================
26  SME Server is the leading Linux distribution for small and medium  
27  enterprises. SME Server is brought to you by Koozali Foundation, Inc.,  SME Server is the leading Linux distribution for small and medium
28  a non-profit corporation that exists to provide marketing and legal support  enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc.,
29  for SME Server.  a non-profit corporation that exists to provide marketing and legal support
30    for SME Server.
31  SME Server is freely available under the GNU General Public License and  
32  is only possible through the efforts of the SME Server community.  SME Server is freely available under the GNU General Public License and
33  However, the availability and quality of SME Server is dependent on  is only possible through the efforts of the SME Server community.
34  meeting our expenses, such as hosting costs, server hardware, etc.  However, the availability and quality of SME Server is dependent on
35    meeting our expenses, such as hosting costs, server hardware, etc.
36  As such, we ask for a donation to offset costs and fund further development.  
37    As such, we ask for a donation to offset costs and fund further development.
38  a) If you are a school, a church, a non-profit organisation or an individual  
39  using SME Server for private purposes, we would appreciate you to contribute  a) If you are a school, a church, a non-profit organisation or an individual
40  within your means toward the costs associated with hosting, maintenance and  using SME Server for private purposes, we would appreciate you to contribute
41  development.  within your means toward the costs associated with hosting, maintenance and
42    development.
43  b) If you are a company or an integrator and you are deploying SME Server in  
44  the course of your work to generate revenue, we expect you to make a donation  b) If you are a company or an integrator and you are deploying SME Server in
45  commensurate with the level of revenue you generate and the number of servers  the course of your work to generate revenue, we expect you to make a donation
46  your have in the field. Please, help the project  commensurate with the level of revenue you generate and the number of servers
47    your have in the field. Please, help the project
48  Please visit http://wiki.contribs.org/Donate to donate.  
49    Please visit http://wiki.contribs.org/Donate to donate.
50  Koozali Inc is happy to supply an invoice for any donations received,  
51  simply email treasurer@koozali.org  Koozali Inc is happy to supply an invoice for any donations received,
52    simply email treasurer@koozali.org
53  Notes  
54  =====  
55  In-place upgrades are not supported. It is necessary to backup and then restore.  Notes
56  /boot partition is always RAID 1.  =====
57  The spare handling for RAID arrays is not implemented.  
58    In-place upgrades are not supported. It is necessary to backup and then restore.
59  USB installs are now supported, see:  /boot partition is always RAID 1.
60  http://wiki.contribs.org/Install_From_USB#SME_Server_9  
61    The spare handling for RAID arrays is not implemented.
62  Major changes in this release  
63  =============================  USB installs are now supported, see:
64  Added functionality to use a Dummy NIC for the internal interface  http://wiki.contribs.org/Install_From_USB#SME_Server_9
65  Set the check update frequency of smecontribs through the server-manager  
66  Disable SSLv3  
67  Added Windows 10 support for SME Domain  Major changes in this release
68    =============================
69  Changes in this release  
70  =======================  Major Changes in this release. Updated all to Koozali branding. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost. File Server - added W10 support to SME Domain. LDAP - Hook into the new ssl-update event. Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.
71    
72  Only the changes since SME Server 9.0 are listed, mainly  
73  autogenerated from the changelogs.  Detailed changes in this release
74    =======================
75  Packages altered by Centos, Redhat, and Fedora-associated developers are  
76  not included.  Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.
77    
78  Backups  Packages altered by Centos, Redhat, and Fedora-associated developers are not included.
79  -------  
80   - dar new upstream version  Text With Bug Numbers
81   - dar add pkgconfig  Text for ISO Release Notes with Bug Numbers
82   - Workstation Backup, do not fail backup for mtime/ctime mismatch  The changelogs are written per package, and each package is assigned a group.
83   - Change the sub checkMount() to findmnt Ian Wells <esmith@wellsi.com>  
84   - Add requires nfs-utils  File Server
85   - The nfs service is neither started or allowed to start  
86   - Don't remove the apache group during restore  e-smith-samba
87    - Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
88  LDAP  proftpd
89  ----  - Additional tweak (to avoid null pointer dereference) for upstream bug 3868
90   - Remove size limit for search result  - Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
91   - Make pdbedit output independent from locale and timezone so it can be    see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
92     parsed  - Also fixed related issue where only first DH param in TLSDHParamFile is used,
93   - Symlink /etc/init.d/ldap to /usr/bin/sv    regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
94   - Chown all DB files to ldap before staring slapd  - Fix SUID/SGID directory permission setting regression introduced with fix
95   - Set checkpoint in slapd.conf instead of DB_CONFIG    for CVE-2012-6095 (#1297264)
96   - Stop ldap on shutdown (rc0 and rc6)  - Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)
97   - Don't overwrite the ldif dump if slapcat's output is empty  
98     (code from Charlie Brady)  LDAP
99   - Run db_recover on startup  
100   - Don't wipe LDAP DB when the ldif dump is empty  e-smith-ldap
101    - Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
102  Localisation  - Better default cipher suite, and honor global suite [SME: 10113]
103  ------------  - Hook into the new ssl-update event [SME: 9152]
104   - apply locale smeserver-locale-2.4.0-locale-2015-07-12.patch  
105   - apply locale smeserver-locale-2.4.0-locale-2015-07-01.patch  Localisation
106   - apply locale 2015-03-14 patch from pootle  
107   - apply locale 2014-12-25 patch from pootle  smeserver-locale
108    - apply locale 2017-03-03 patch from pootle [SME: 9592]
109  Mail Server  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
110  -----------    by assuming the date is correct and changing the weekday.
111   - ClamAV Updated to release 0.98.7  
112   - Remove the patch e-smith-email-5.4.0-UEsDBBQDAAAIA-new-signature.patch  Mail Server
113   - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA  
114   - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3  clamav
115   - Disable fips mode on stunnel  - Update to release 0.99.2 [SME: 9489]
116   - Use stunnel instead of sslio to support TLS  - Add pcre-devel to BuildRequires [SME: 9151]
117   - Revert forcing TLSv1 patch as it breaks some inbound delivery  e-smith-pop3
118   - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to  - Hook into a new ssl-update event [SME: 9152]
119     push the fix for TLSv1  - Allow setting SSL protocols from DB (and set TLSv1 back to enabled
120   - Modify whitelist_soft transaction to interact with dnsbl filter    on a default install) [SME: 9175]
121     by John Crisp <jcrisp@safeandsoundit.co.uk>  - Disable TLSv1 [SME: 9169]
122   - Force usage of TLSv1  e-smith-qmail
123   - Increase MemLimit to 700M for clamav-0.98  - Add possibility to exclude users or members of other groups from group
124   - Allow custom passdb args    email address [SME: 9540]
125   - allow IP relayclient stored by DB  qmail
126     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - Consider literal <> as null sender [SME: 9883]
127     & Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>  qpsmtpd
128   - allow IP relayclient stored by DB  - Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
129     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
130    - Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
131  Server manager  - Use eval to fetch dkim policies, prevent fatal errors in case of DNS
132  --------------    timeout [SME: 9504]
133   - fix gzfile accept paths with NUL character #1213407  - Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
134   - fix patch for CVE-2015-4024  - Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
135   - fix more functions accept paths with NUL character #1213407    entry published with no rua [SME: 9507]
136   - soap: missing fix for #1222538 and #1204868  - Fix error when RCPT TO is not valid [SME: 8861]
137   - core: fix multipart/form-data request can use excessive  - Fix karma logic by checking negative strikes [SME: 9502]
138     amount of CPU usage CVE-2015-4024  - Backport a fix for karma_tool so it can find its database [SME: 9502]
139   - fix various functions accept paths with NUL character  - Update to 0.96 (with some backports from GIT head) [SME: 8861]
140     CVE-2015-4026, #1213407  - Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
141   - ftp: fix integer overflow leading to heap overflow when    [SME: 9162]
142     reading FTP file listing CVE-2015-4022  - Correctly log login attempts with nulls in login name [SME: 9167]
143   - phar: fix buffer over-read in metadata parsing CVE-2015-2783  - Disable TLSv1 [SME: 9162]
144   - phar: invalid pointer free() in phar_tar_process_metadata()  qpsmtpd-plugins
145     CVE-2015-3307  - remove whitelist_soft [SME: 10125]
146   - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329  smeserver-clamav
147   - phar: fix memory corruption in phar_parse_tarfile caused by  - Disable unofficial sigs for filesystem scans [SME: 9142]
148     empty entry file name CVE-2015-4021  smeserver-dovecot
149   - soap: more fix type confusion through unserialize #1222538  - Better default cipher suite, and honor global suite [SME: 10114]
150   - soap: more fix type confusion through unserialize #1204868  - Hook into the new ssl-update event [SME: 9152]
151   - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425  - Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
152   - core: fix use-after-free in unserialize CVE-2015-2787    [SME: 9175]
153   - exif: fix free on unitialized pointer CVE-2015-0232  - Disable TLSv1 [SME: 9175]
154   - gd: fix buffer read overflow in gd_gif.c CVE-2014-9709  smeserver-qpsmtpd
155   - date: fix use after free vulnerability in unserialize CVE-2015-0273  - updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
156   - enchant: fix heap buffer overflow in enchant_broker_request_dict    account list using a subdomain [SME: 10116]
157     CVE-2014-9705  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday, by assuming the date is correct
158   - phar: use after free in phar_object.c CVE-2015-2301    and changing the weekday.
159   - soap: fix type confusion through unserialize    Thu May 11 2005 --> Thu May 05 2005 or Wed May 11 2005 or Thu May 12 2005 or ....
160   - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710    Sun Sep 25 2010 --> Sun Sep 19 2010 or Sat Sep 25 2010 or Sun Sep 26 2010 or ....
161   - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668  - Set the default helo policy to lenient [SME: 9767]
162   - core: fix integer overflow in unserialize() CVE-2014-3669  - Turn SPF and DMARC rejects off by default [SME: 9654]
163   - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670  - Fix disabling DMARC reporting [SME: 9507]
164   - spl: fix use-after-free in ArrayIterator due to object  - Remove o and r DKIM fields as they are not standard [SME: 9506]
165     change during sorting. CVE-2014-4698  - In qpsmtpd-print-dns set DKIM options after the public key so the string will still be splitted correctly [SME: 9506]
166   - spl: fix use-after-free in SPL Iterators. CVE-2014-4670  - Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
167   - gd: fix NULL pointer dereference in gdImageCreateFromXpm.  - Remove warning about spool dir permission on startup [SME: 9511]
168     CVE-2014-2497  - Add missing patch for DKIM signing [SME: 9506]
169   - fileinfo: fix incomplete fix for CVE-2012-1571 in  - Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
170     cdf_read_property_info. CVE-2014-3587  - Check SPF for inbound emails [SME: 9505]
171   - core: fix incomplete fix for CVE-2014-4049 DNS TXT  - Check DKIM for inbound emails [SME: 9504]
172     record parsing. CVE-2014-3597  - Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
173   - core: type confusion issue in phpinfo(). CVE-2014-4721  - Store and send DMARC aggregate reports [SME: 9507]
174   - date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712  - Support DKIM signing for outbound emails [SME: 9506]
175   - core: fix heap-based buffer overflow in DNS TXT record parsing.  - Use an additional badrcptto file list for external connections so local only pseudonymes work as expected [SME: 9503]
176     CVE-2014-4049  - Enable the bogus_bounce plugin [SME: 9501]
177   - core: unserialize() SPL ArrayObject / SPLObjectStorage type  - Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
178     confusion flaw. CVE-2014-3515  - Add support for the uribl plugin [SME: 9499]
179   - fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270  - Change separator for SBList and RBLlist from : to , [SME: 9498]
180   - fileinfo: unrestricted recursion in handling of indirect type  - Switch to the clamdscan plugin [SME: 9497]
181     rules. CVE-2014-1943  - Enabe the loadcheck plugin [SME: 9508]
182   - fileinfo: out of bounds read in CDF parser. CVE-2012-1571  - Add support for the karma plugin [SME: 9502]
183   - fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479  - Work with qpsmtpd 0.96 [SME: 8861]
184   - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480  - Expand all ssl related conf in ssl-update [SME: 9152]
185   - fileinfo: cdf_unpack_summary_info() excessive looping  - Hook into a new ssl-update event [SME: 9152]
186     DoS. CVE-2014-0237  - Allow setting SSL protocols from DB [SME: 9162]
187   - fileinfo: CDF property info parsing nelements infinite  smeserver-spamassassin
188     loop. CVE-2014-0238  - Rewrite spamd run script to add support for --allow-tell [SME: 10138]
189   - add php_get_module_initialized internal function (#1053301)  - Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
190   - soap: fixRFC2616 transgression (#1045019)  - Disable ipv6 support to prevent a warning during startup [SME: 9153]
191   - fix static calling in non-static method (#953786)  
192   - fix autoload called from closing session (#954027)  Server manager
193   - drop unneeded part of CVE-2006-724.patch and fileinfo.patch  
194     extension not provided or git binary patches (#1064027)  e-smith-manager
195   - odbc: fix incompatible pointer type (#1053982)  - reapply patch 4
196   - mysqli: fix possible segfault in mysqli_stmt::bind_result  - Update server-manager to Koozali branding [SME: 9678]
197     php bug 66762 (#1069167)  - move fix to the right line to be effective [SME: 9920]
198   - mysql: fix php_mysql_fetch_hash writes long value into int  - fix bad redirection parameter that might reveal session information to remote site temporarily
199     php bug 52636 (#1054953)    reverting patch 4 for fast release of security fix please put it back at next release  [SME: 9920]
200    - Update server-manager to Koozali branding [SME: 9678]
201  Web Server  - e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
202  ----------  - Remove index option for manager's resources [SME: 9589]
203   - DIsable SSLv3  - fix 307 redirection to http when https is used [SME: 8825]
204   - Revert CRIME mitigation patch, as it's not needed  - update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0-  dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com [SME: 9271]
205   - Mitigate CVE-2012-4929  - Really don't redirect to http when login in/out of the server-manager [SME: 9163]
206   - Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts)  - Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
207   - Remove obsolete gpc_order setting from php.ini.  - Allow access to the server-manager without SSL from the loopback [SME: 9163]
208   - Add an upload_tmp_folder setting by db command  php
209   - Thanks to Michael McCarn and Jean-philippe Pialasse  - don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
210    - fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
211  Other fixes and updates  - fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
212  -----------------------  - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
213   - Added new createlinks function event_templates event_actions event_services  - add options to enable TLS in curl #1255920
214   - Don't claim to own /sbin and /sbin/e-smith  - fix segfault in gc_collect_cycles #1122681
215   - display variable name in the server-manager $domainName, $domainDesc $domain  
216   - Revert the upload_tmp_folder patch as it needs some more work  Webmail and Groupware
217   - Add dummy NIC support as InternalInterface  
218   - Only fire the ip-change event when IP is assigned to WAN nic  
219     (Code by Charlie Brady and John Crisp)  Web Server
220   - Only reset service access when switching to or from private server mode  
221     (Code by Charlie Brady)  e-smith-apache
222   - When quiting the console app with unsaved changes set the default selected  - Hook into the new ssl-update event [SME: 9152]
223     answer to NO  - Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
224   - Added a comment to specify the real configuration file of dhcpd  - Disable TLSv1 [SME: 9154]
225   - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch  
226   - Ensure www group exists and that apache is an alias of www  Other fixes and updates
227   - Check where running runlevel 4, not 7 in service wrapper  
228   - Correctly update NIC configuration on single NIC systems  e-smith-base
229   - Symlink udev-post service in rc7  - Use ip route syntax to define routes to local network [SME: 9905]
230   - Fix PPPoE after a post-upgrade  - Allow /32 masks on the external interface, in which case we don't
231   - Remove dependency on microcode_ctl    check if the gateway is on the correct network) [SME: 9765]
232   - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark Casey  - Add a column to display forwarding address [SME: 9174]
233   - Don't claim to own /sbin and /sbin/e-smith  - Correctly display http URL to the server-manager in the console [SME: 9163]
234   - Add an upload_tmp_folder setting by db command  - Fire ssl-update event when default cert is renewed [SME: 2257]
235     Thanks to Michael McCarn and Jean-philippe Pialasse  - Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
236   - the folder /tmp is created by the event init-ibays  e-smith-devtools
237   - the event ibay-modify create/chown/chmod the folder /tmp  - Quote filenames in genfilelist so filenames containing spaces are correctly
238   - Add an upload_tmp_folder setting by db command    handled [SME: 9758]
239     Thanks to Michael McCarn and Jean-philippe Pialasse  e-smith-grub
240   - Force SSL following ibays settings to the relevant domain  - Remove motd text from grub.cfg [SME: 9161]
241   - Perl::critic syntax modifications  e-smith-hosts
242   - Add more PHP options to ibays only by db commands  - Allow empty comment when creating/modifying a hostname [SME: 9177]
243   - Add SSLRequireSSL to ibays when SSL is set to enabled  e-smith-ibays
244   - Allow the admin upsd in /etc/hosts.allow  - Remove double / in SSL RewriteRule [SME: 9195]
245   - Creation Admin Privilege for use of upscmd & upsrw  e-smith-lib
246   - Remove obsolete directives {allowfrom}  - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
247   - Access property created (default value is 'localhost')  e-smith-proxy
248   - Remove obsolete directives {ACL,ACCEPT,REJECT} and switch to LISTEN  - Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
249     in /etc/ups/upsd.conf  initscripts
250   - Allow NUT in /etc/hosts.allow and in /etc/services  - Rebase on upstream 9.03.53-1 [SME: 9534]
251     Code change from Daniel B.<daniel@firewall-services.com>  - Roll in CentOS Branding
252   - Revert the patch e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - functions: parse -d first
253   - Duplicate hostnames with different IP are not used, a warn in log is printed  - functions: fix ignored delay in killproc
254   - The server hostname can not be used by a dhcp client, a warning in log is printed  - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
255   - Changed the name of /tmp/dhcpd.leases to /tmp/tmpdhcpd.leases  - functions: improve killing loops
256     when the dhcpd lease is modified  - netfs: tweak nfs umount
257   - Do template-expand of /var/service/tinydns/root/data  - sysctl.conf: mention sysctl -a
258   - Do sigus1 of dhcp-dns & dnscache  - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
259   - Forked DHCPparse for parsing the end of lease and remove old entry of dnscache  - spec: require plymouth
260   - Require perl-Text-DHCPparse removed  - fix mangled sysconfig/init.s390
261   - Timestamp added in tinydns, the entry in dnscache is cleared when the lease is over  - rc.sysinit: don't perform fsck twice with /.autorelabel
262   - Add new feature 'Parse dhcpd.leases and feed to tinydns'  - ifdown-eth: fix comparison
263   - e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - ifup-eth: if arping fails, output responding MAC
264     made from the solution of Stefano Zamboni  - network-functions: fix change_resolv_conf after grep update
265   - Make slapd service an alias for ldap  - spec: add sysctl.d dir
266   - Switched to sysvinit from systemd (it's rhel-6)  - rc.sysinit: fix typo in fs
267   - Fixed license tag Related: rhbz#632853  - rename_devices: comments need to have a blank before them
268   - pptpd New version  - rename_device: remove comments and trailing whitespaces
269   - Dropped pppd-unbundle patch (upstreamed)  - bonding: warn if the ifup for slave device failed
270   - Various fixes according to Fedora review Related: rhbz#632853  - clarify daemon() usage message
271   - Modified for Fedora Resolves: rhbz#632853  - ifdown: clean ipv4 localhost addresses
272   - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252  - ifup-post: check resolve.conf also with DNS2
273   - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the  - ifup: add missing quotes
274     CVE-2012-3478 and CVE-2012-2252 fixes.  - ifup-eth: some bridge options are applied later
275   - Updated makefile.patch to preserve RPM CFLAGS.  - init.d/halt: give init some time to reexecute
276   - Added command-line-error.patch (from Debian), correcting error message  - network-scripts: DEVICE and HWADRR could be quoted by apostrophe
277     generated when insecure command line option is used (CVE-2012-3478 fix  - ifup-wireless: fix calling of phy_wireless_device
278     regression).  - rc.sysinit: apply quotas after system is relabeled
279   - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild  mod_auth_tkt
280   - Add patch for rsync3 compat (#485946)  - backport to SME9 fix redirection when proxy ssl [SME: 8825]
281   - Update runit to 2.1.2  - update apxs path for SME9 (sbin)
282   - Remove now uneeded obsolete directives  smeserver-release
283   - Remove openssl from the Exclude list of centos repo  - Bump for beta1 release of 9.2 [SME: 9525]
284   - Add a default Yum db property for check4contribsupdates  smeserver-support
285   - Added a check-update for the smecontribs repository  - updated sources with new pictures fix hover color [SME: 9678]
286   - Move protected package list to the correct location  - Koozali branding of manager [SME: 9678]
287    - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and changing the weekday.
288  General features  - Update copyright in server-manager footer [SME: 9266]
289  ================  - Don't put motd content in /etc/redhat-release [SME: 9161]
290  - Based on CentOS 6.7 and all available updates  smeserver-yum
291    - added centos SCLo SIG gpg rpm signing key [SME: 10102]
292  Terry Fage    will allow to install SCL packages directly from smecontribs
293  On behalf of the SME Server development team  
294    General features
295    ================
296    
297    - Based on CentOS 6.8 and all available updates
298    
299    Terry Fage
300    Compilation of release data is thanks to Ian Wells
301    On behalf of the Koozali SME Server development team


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed