/[smeserver]/cdrom.image/sme9/README.txt
ViewVC logotype

Diff of /cdrom.image/sme9/README.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph | View Patch Patch

Revision 1.16 by vip-ire, Wed Sep 30 16:08:53 2015 UTC Revision 1.27 by unnilennium, Thu Apr 27 00:04:51 2017 UTC
# Line 1  Line 1 
1  Koozali SME Server 9.1 Beta 3 Release Announcement  Koozali SME Server 9.2 Final Release Notes
2    ===========================================
3  Koozali SME Server 9.1 Beta 3 Release Notes  
4  ===========================================  26 April 2017
5  30th Sept 2015  
6    The Koozali SME Server (SME Server) development team is pleased to announce
7  The Koozali SME Server (SME Server) development team is pleased to announce  the release of SME Server 9.2 Final which is based on CentOS 6.9
8  the release of SME Server 9.1 Beta 3 which is based on CentOS 6.7.  
9    Bug reports and reports of potential bugs should be raised in the bug
10  Bug reports and reports of potential bugs should be raised in the bug  tracker (and only there, please);
11  tracker (and only there, please);  
12        http://bugs.contribs.org/
13      http://bugs.contribs.org/  
14    Download
15  Download  ========
16  ========  
17  You can download SME Server 9.1 Beta 3 from  You can download Koozali SME Server 9.2 Final from
18  http://mirror.contribs.org/smeserver/releases/testing/9.1.beta3/  http://mirror.contribs.org/smeserver/releases/9.2/
19  or for other methods see http://wiki.contribs.org/SME_Server:Download  or for other methods see http://wiki.contribs.org/SME_Server:Download
20    
21  Please note it may take up to 48 hours for mirrors to finish syncing,  Please note it may take up to 48 hours for mirrors to finish syncing,
22  during this time you may experience problems.  during this time you may experience problems.
23    
24  About SME Server  About SME Server
25  ================  ================
26  SME Server is the leading Linux distribution for small and medium  
27  enterprises. SME Server is brought to you by Koozali Foundation, Inc.,  SME Server is the leading Linux distribution for small and medium
28  a non-profit corporation that exists to provide marketing and legal support  enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc.,
29  for SME Server.  a non-profit corporation that exists to provide marketing and legal support
30    for SME Server.
31  SME Server is freely available under the GNU General Public License and  
32  is only possible through the efforts of the SME Server community.  SME Server is freely available under the GNU General Public License and
33  However, the availability and quality of SME Server is dependent on  is only possible through the efforts of the SME Server community.
34  meeting our expenses, such as hosting costs, server hardware, etc.  However, the availability and quality of SME Server is dependent on
35    meeting our expenses, such as hosting costs, server hardware, etc.
36  As such, we ask for a donation to offset costs and fund further development.  
37    As such, we ask for a donation to offset costs and fund further development.
38  a) If you are a school, a church, a non-profit organisation or an individual  
39  using SME Server for private purposes, we would appreciate you to contribute  a) If you are a school, a church, a non-profit organisation or an individual
40  within your means toward the costs associated with hosting, maintenance and  using SME Server for private purposes, we would appreciate you to contribute
41  development.  within your means toward the costs associated with hosting, maintenance and
42    development.
43  b) If you are a company or an integrator and you are deploying SME Server in  
44  the course of your work to generate revenue, we expect you to make a donation  b) If you are a company or an integrator and you are deploying SME Server in
45  commensurate with the level of revenue you generate and the number of servers  the course of your work to generate revenue, we expect you to make a donation
46  your have in the field. Please, help the project  commensurate with the level of revenue you generate and the number of servers
47    your have in the field. Please, help the project
48  Please visit http://wiki.contribs.org/Donate to donate.  
49    Please visit http://wiki.contribs.org/Donate to donate.
50  Koozali Inc is happy to supply an invoice for any donations received,  
51  simply email treasurer@koozali.org  Koozali Inc is happy to supply an invoice for any donations received,
52    simply email treasurer@koozali.org
53  Notes  
54  =====  
55  In-place upgrades are not supported. It is necessary to backup and then restore.  Notes
56  /boot partition is always RAID 1.  =====
57  The spare handling for RAID arrays is not implemented.  
58    In-place upgrades are not supported. It is necessary to backup and then restore.
59  USB installs are now supported, see:  /boot partition is always RAID 1.
60  http://wiki.contribs.org/Install_From_USB#SME_Server_9  
61    The spare handling for RAID arrays is not implemented.
62  Major changes in this release  
63  =============================  USB installs are now supported, see:
64  Added functionality to use a Dummy NIC for the internal interface  http://wiki.contribs.org/Install_From_USB#SME_Server_9
65  Set the check update frequency of smecontribs through the server-manager  
66  Disable SSLv3  
67  Added Windows 10 support for SME Domain  Major changes in this release
68    =============================
69  Changes in this release  
70  =======================  Major Changes in this release. Updated all to Koozali branding. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost, Add Bug reporting template. File Server - added W10 support to SME Domain. LDAP - Hook into the new ssl-update event. Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.
71    
72  Only the changes since SME Server 9.0 are listed, mainly  
73  autogenerated from the changelogs.  Detailed changes in this release
74    =======================
75  Packages altered by Centos, Redhat, and Fedora-associated developers are  
76  not included.  Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.
77    
78  Backups  Packages altered by Centos, Redhat, and Fedora-associated developers are not included.
79  -------  
80   - dar new upstream version  Text for ISO Release Notes with Bug Numbers
81   - dar add pkgconfig  The changelogs are written per package, and each package is assigned a group.
82   - Workstation Backup, do not fail backup for mtime/ctime mismatch  
83   - Change the sub checkMount() to findmnt Ian Wells <esmith@wellsi.com>  File Server
84   - Add requires nfs-utils  
85   - The nfs service is neither started or allowed to start  e-smith-samba
86   - Don't remove the apache group during restore  - fix outlook error code 0x8004011c when setting up and email account on a win10 computer joined to a domain (with   roaming profiles) [SME: 10106]
87    - Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
88  LDAP  proftpd
89  ----  - Additional tweak (to avoid null pointer dereference) for upstream bug 3868
90   - Remove size limit for search result  - Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
91   - Make pdbedit output independent from locale and timezone so it can be    see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
92     parsed  - Also fixed related issue where only first DH param in TLSDHParamFile is used,
93   - Symlink /etc/init.d/ldap to /usr/bin/sv    regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
94   - Chown all DB files to ldap before staring slapd  - Fix SUID/SGID directory permission setting regression introduced with fix
95   - Set checkpoint in slapd.conf instead of DB_CONFIG    for CVE-2012-6095 (#1297264)
96   - Stop ldap on shutdown (rc0 and rc6)  - Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)
97   - Don't overwrite the ldif dump if slapcat's output is empty  
98     (code from Charlie Brady)  LDAP
99   - Run db_recover on startup  
100   - Don't wipe LDAP DB when the ldif dump is empty  e-smith-ldap
101    - Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
102  Localisation  - Better default cipher suite, and honor global suite [SME: 10113]
103  ------------  - Hook into the new ssl-update event [SME: 9152]
104   - apply locale smeserver-locale-2.4.0-locale-2015-07-12.patch  
105   - apply locale smeserver-locale-2.4.0-locale-2015-07-01.patch  Localisation
106   - apply locale 2015-03-14 patch from pootle  
107   - apply locale 2014-12-25 patch from pootle  smeserver-locale
108    - apply locale 2017-03-16 patch from pootle [SME: 9592]
109  Mail Server  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
110  -----------    by assuming the date is correct and changing the weekday.
111   - ClamAV Updated to release 0.98.7  
112   - Remove the patch e-smith-email-5.4.0-UEsDBBQDAAAIA-new-signature.patch  Mail Server
113   - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA  
114   - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3  clamav
115   - Disable fips mode on stunnel  - Update to release 0.99.2 [SME: 9489]
116   - Use stunnel instead of sslio to support TLS  - Add pcre-devel to BuildRequires [SME: 9151]
117   - Revert forcing TLSv1 patch as it breaks some inbound delivery  e-smith-pop3
118   - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to  - Hook into a new ssl-update event [SME: 9152]
119     push the fix for TLSv1  - Allow setting SSL protocols from DB (and set TLSv1 back to enabled
120   - Modify whitelist_soft transaction to interact with dnsbl filter    on a default install) [SME: 9175]
121     by John Crisp <jcrisp@safeandsoundit.co.uk>  - Disable TLSv1 [SME: 9169]
122   - Force usage of TLSv1  e-smith-qmail
123   - Increase MemLimit to 700M for clamav-0.98  - Add possibility to exclude users or members of other groups from group
124   - Allow custom passdb args    email address [SME: 9540]
125   - allow IP relayclient stored by DB  qmail
126     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - Consider literal <> as null sender [SME: 9883]
127     & Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>  qpsmtpd
128   - allow IP relayclient stored by DB  - Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
129     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
130    - Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
131  Server manager  - Use eval to fetch dkim policies, prevent fatal errors in case of DNS
132  --------------    timeout [SME: 9504]
133   - fix gzfile accept paths with NUL character #1213407  - Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
134   - fix patch for CVE-2015-4024  - Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
135   - fix more functions accept paths with NUL character #1213407    entry published with no rua [SME: 9507]
136   - soap: missing fix for #1222538 and #1204868  - Fix error when RCPT TO is not valid [SME: 8861]
137   - core: fix multipart/form-data request can use excessive  - Fix karma logic by checking negative strikes [SME: 9502]
138     amount of CPU usage CVE-2015-4024  - Backport a fix for karma_tool so it can find its database [SME: 9502]
139   - fix various functions accept paths with NUL character  - Update to 0.96 (with some backports from GIT head) [SME: 8861]
140     CVE-2015-4026, #1213407  - Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
141   - ftp: fix integer overflow leading to heap overflow when    [SME: 9162]
142     reading FTP file listing CVE-2015-4022  - Correctly log login attempts with nulls in login name [SME: 9167]
143   - phar: fix buffer over-read in metadata parsing CVE-2015-2783  - Disable TLSv1 [SME: 9162]
144   - phar: invalid pointer free() in phar_tar_process_metadata()  qpsmtpd-plugins
145     CVE-2015-3307  - remove whitelist_soft [SME: 10125]
146   - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329  smeserver-clamav
147   - phar: fix memory corruption in phar_parse_tarfile caused by  - Disable unofficial sigs for filesystem scans [SME: 9142]
148     empty entry file name CVE-2015-4021  smeserver-dovecot
149   - soap: more fix type confusion through unserialize #1222538  - Better default cipher suite, and honor global suite [SME: 10114]
150   - soap: more fix type confusion through unserialize #1204868  - Hook into the new ssl-update event [SME: 9152]
151   - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425  - Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
152   - core: fix use-after-free in unserialize CVE-2015-2787    [SME: 9175]
153   - exif: fix free on unitialized pointer CVE-2015-0232  - Disable TLSv1 [SME: 9175]
154   - gd: fix buffer read overflow in gd_gif.c CVE-2014-9709  smeserver-qpsmtpd
155   - date: fix use after free vulnerability in unserialize CVE-2015-0273  - updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
156   - enchant: fix heap buffer overflow in enchant_broker_request_dict    account list using a subdomain [SME: 10116]
157     CVE-2014-9705  - Set the default helo policy to lenient [SME: 9767]
158   - phar: use after free in phar_object.c CVE-2015-2301  - Turn SPF and DMARC rejects off by default [SME: 9654]
159   - soap: fix type confusion through unserialize  - Fix disabling DMARC reporting [SME: 9507]
160   - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710  - Remove o and r DKIM fields as they are not standard [SME: 9506]
161   - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668  - In qpsmtpd-print-dns set DKIM options after the public key so the string will still be splitted correctly [SME: 9506]
162   - core: fix integer overflow in unserialize() CVE-2014-3669  - Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
163   - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670  - Remove warning about spool dir permission on startup [SME: 9511]
164   - spl: fix use-after-free in ArrayIterator due to object  - Add missing patch for DKIM signing [SME: 9506]
165     change during sorting. CVE-2014-4698  - Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
166   - spl: fix use-after-free in SPL Iterators. CVE-2014-4670  - Check SPF for inbound emails [SME: 9505]
167   - gd: fix NULL pointer dereference in gdImageCreateFromXpm.  - Check DKIM for inbound emails [SME: 9504]
168     CVE-2014-2497  - Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
169   - fileinfo: fix incomplete fix for CVE-2012-1571 in  - Store and send DMARC aggregate reports [SME: 9507]
170     cdf_read_property_info. CVE-2014-3587  - Support DKIM signing for outbound emails [SME: 9506]
171   - core: fix incomplete fix for CVE-2014-4049 DNS TXT  - Use an additional badrcptto file list for external connections so local only pseudonymes work as expected [SME: 9503]
172     record parsing. CVE-2014-3597  - Enable the bogus_bounce plugin [SME: 9501]
173   - core: type confusion issue in phpinfo(). CVE-2014-4721  - Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
174   - date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712  - Add support for the uribl plugin [SME: 9499]
175   - core: fix heap-based buffer overflow in DNS TXT record parsing.  - Change separator for SBList and RBLlist from : to , [SME: 9498]
176     CVE-2014-4049  - Switch to the clamdscan plugin [SME: 9497]
177   - core: unserialize() SPL ArrayObject / SPLObjectStorage type  - Enabe the loadcheck plugin [SME: 9508]
178     confusion flaw. CVE-2014-3515  - Add support for the karma plugin [SME: 9502]
179   - fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270  - Work with qpsmtpd 0.96 [SME: 8861]
180   - fileinfo: unrestricted recursion in handling of indirect type  - Expand all ssl related conf in ssl-update [SME: 9152]
181     rules. CVE-2014-1943  - Hook into a new ssl-update event [SME: 9152]
182   - fileinfo: out of bounds read in CDF parser. CVE-2012-1571  - Allow setting SSL protocols from DB [SME: 9162]
183   - fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479  smeserver-spamassassin
184   - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480  - Rewrite spamd run script to add support for --allow-tell [SME: 10138]
185   - fileinfo: cdf_unpack_summary_info() excessive looping  - Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
186     DoS. CVE-2014-0237  - Disable ipv6 support to prevent a warning during startup [SME: 9153]
187   - fileinfo: CDF property info parsing nelements infinite  
188     loop. CVE-2014-0238  Server manager
189   - add php_get_module_initialized internal function (#1053301)  
190   - soap: fixRFC2616 transgression (#1045019)  e-smith-manager
191   - fix static calling in non-static method (#953786)  - add a panel to ease reporting bugs [SME: 10238]
192   - fix autoload called from closing session (#954027)  - fix typo in e-smith-manager-2.6.0-bz10187-emptyback.patch [SME: 10187]
193   - drop unneeded part of CVE-2006-724.patch and fileinfo.patch  - avoid internal server error if empty back parameter [SME: 10187]
194     extension not provided or git binary patches (#1064027)  - fix too short timeout in server-manager [SME: 10186]
195   - odbc: fix incompatible pointer type (#1053982)  - reapply patch 4
196   - mysqli: fix possible segfault in mysqli_stmt::bind_result  - Update server-manager to Koozali branding [SME: 9678]
197     php bug 66762 (#1069167)  - move fix to the right line to be effective [SME: 9920]
198   - mysql: fix php_mysql_fetch_hash writes long value into int  - fix bad redirection parameter that might reveal session information to remote site temporarily
199     php bug 52636 (#1054953)    reverting patch 4 for fast release of security fix please put it back at next release  [SME: 9920]
200    - Update server-manager to Koozali branding [SME: 9678]
201  Web Server  - e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
202  ----------  - Remove index option for manager's resources [SME: 9589]
203   - DIsable SSLv3  - fix 307 redirection to http when https is used [SME: 8825]
204   - Revert CRIME mitigation patch, as it's not needed  - update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0
205   - Mitigate CVE-2012-4929  - dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com [SME: 9271]
206   - Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts)  - Really don't redirect to http when login in/out of the server-manager [SME: 9163]
207   - Remove obsolete gpc_order setting from php.ini.  - Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
208   - Add an upload_tmp_folder setting by db command  - Allow access to the server-manager without SSL from the loopback [SME: 9163]
209   - Thanks to Michael McCarn and Jean-philippe Pialasse  php
210    - don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
211  Other fixes and updates  - fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
212  -----------------------  - fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
213   - Added new createlinks function event_templates event_actions event_services  - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
214   - Don't claim to own /sbin and /sbin/e-smith  - add options to enable TLS in curl #1255920
215   - display variable name in the server-manager $domainName, $domainDesc $domain  - fix segfault in gc_collect_cycles #1122681
216   - Revert the upload_tmp_folder patch as it needs some more work  
217   - Add dummy NIC support as InternalInterface  Webmail and Groupware
218   - Only fire the ip-change event when IP is assigned to WAN nic  
219     (Code by Charlie Brady and John Crisp)  
220   - Only reset service access when switching to or from private server mode  Web Server
221     (Code by Charlie Brady)  
222   - When quiting the console app with unsaved changes set the default selected  e-smith-apache
223     answer to NO  - Hook into the new ssl-update event [SME: 9152]
224   - Added a comment to specify the real configuration file of dhcpd  - Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
225   - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch  - Disable TLSv1 [SME: 9154]
226   - Ensure www group exists and that apache is an alias of www  
227   - Check where running runlevel 4, not 7 in service wrapper  Other fixes and updates
228   - Correctly update NIC configuration on single NIC systems  
229   - Symlink udev-post service in rc7  e-smith-base
230   - Fix PPPoE after a post-upgrade  - Use ip route syntax to define routes to local network [SME: 9905]
231   - Remove dependency on microcode_ctl  - Allow /32 masks on the external interface, in which case we don't
232   - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark Casey    check if the gateway is on the correct network) [SME: 9765]
233   - Don't claim to own /sbin and /sbin/e-smith  - Add a column to display forwarding address [SME: 9174]
234   - Add an upload_tmp_folder setting by db command  - Correctly display http URL to the server-manager in the console [SME: 9163]
235     Thanks to Michael McCarn and Jean-philippe Pialasse  - Fire ssl-update event when default cert is renewed [SME: 2257]
236   - the folder /tmp is created by the event init-ibays  - Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
237   - the event ibay-modify create/chown/chmod the folder /tmp  e-smith-devtools
238   - Add an upload_tmp_folder setting by db command  - Quote filenames in genfilelist so filenames containing spaces are correctly
239     Thanks to Michael McCarn and Jean-philippe Pialasse    handled [SME: 9758]
240   - Force SSL following ibays settings to the relevant domain  e-smith-grub
241   - Perl::critic syntax modifications  - Remove motd text from grub.cfg [SME: 9161]
242   - Add more PHP options to ibays only by db commands  e-smith-hosts
243   - Add SSLRequireSSL to ibays when SSL is set to enabled  - Allow empty comment when creating/modifying a hostname [SME: 9177]
244   - Allow the admin upsd in /etc/hosts.allow  e-smith-ibays
245   - Creation Admin Privilege for use of upscmd & upsrw  - Remove double / in SSL RewriteRule [SME: 9195]
246   - Remove obsolete directives {allowfrom}  e-smith-lib
247   - Access property created (default value is 'localhost')  - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
248   - Remove obsolete directives {ACL,ACCEPT,REJECT} and switch to LISTEN  e-smith-proxy
249     in /etc/ups/upsd.conf  - Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
250   - Allow NUT in /etc/hosts.allow and in /etc/services  initscripts
251     Code change from Daniel B.<daniel@firewall-services.com>  - Rebase on upstream 9.03.53-1 [SME: 9534]
252   - Revert the patch e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - Roll in CentOS Branding
253   - Duplicate hostnames with different IP are not used, a warn in log is printed  - functions: parse -d first
254   - The server hostname can not be used by a dhcp client, a warning in log is printed  - functions: fix ignored delay in killproc
255   - Changed the name of /tmp/dhcpd.leases to /tmp/tmpdhcpd.leases  - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
256     when the dhcpd lease is modified  - functions: improve killing loops
257   - Do template-expand of /var/service/tinydns/root/data  - netfs: tweak nfs umount
258   - Do sigus1 of dhcp-dns & dnscache  - sysctl.conf: mention sysctl -a
259   - Forked DHCPparse for parsing the end of lease and remove old entry of dnscache  - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
260   - Require perl-Text-DHCPparse removed  - spec: require plymouth
261   - Timestamp added in tinydns, the entry in dnscache is cleared when the lease is over  - fix mangled sysconfig/init.s390
262   - Add new feature 'Parse dhcpd.leases and feed to tinydns'  - rc.sysinit: don't perform fsck twice with /.autorelabel
263   - e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - ifdown-eth: fix comparison
264     made from the solution of Stefano Zamboni  - ifup-eth: if arping fails, output responding MAC
265   - Make slapd service an alias for ldap  - network-functions: fix change_resolv_conf after grep update
266   - Switched to sysvinit from systemd (it's rhel-6)  - spec: add sysctl.d dir
267   - Fixed license tag Related: rhbz#632853  - rc.sysinit: fix typo in fs
268   - pptpd New version  - rename_devices: comments need to have a blank before them
269   - Dropped pppd-unbundle patch (upstreamed)  - rename_device: remove comments and trailing whitespaces
270   - Various fixes according to Fedora review Related: rhbz#632853  - bonding: warn if the ifup for slave device failed
271   - Modified for Fedora Resolves: rhbz#632853  - clarify daemon() usage message
272   - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252  - ifdown: clean ipv4 localhost addresses
273   - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the  - ifup-post: check resolve.conf also with DNS2
274     CVE-2012-3478 and CVE-2012-2252 fixes.  - ifup: add missing quotes
275   - Updated makefile.patch to preserve RPM CFLAGS.  - ifup-eth: some bridge options are applied later
276   - Added command-line-error.patch (from Debian), correcting error message  - init.d/halt: give init some time to reexecute
277     generated when insecure command line option is used (CVE-2012-3478 fix  - network-scripts: DEVICE and HWADRR could be quoted by apostrophe
278     regression).  - ifup-wireless: fix calling of phy_wireless_device
279   - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild  - rc.sysinit: apply quotas after system is relabeled
280   - Add patch for rsync3 compat (#485946)  mod_auth_tkt
281   - Update runit to 2.1.2  - backport to SME9 fix redirection when proxy ssl [SME: 8825]
282   - Remove now uneeded obsolete directives  - update apxs path for SME9 (sbin)
283   - Remove openssl from the Exclude list of centos repo  smeserver-release
284   - Add a default Yum db property for check4contribsupdates  - Bump for beta1 release of 9.2 [SME: 9525]
285   - Added a check-update for the smecontribs repository  smeserver-support
286   - Move protected package list to the correct location  - updated sources with new pictures fix hover color [SME: 9678]
287    - Koozali branding of manager [SME: 9678]
288  General features  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and changing the weekday.
289  ================  - Update copyright in server-manager footer [SME: 9266]
290  - Based on CentOS 6.7 and all available updates  - Don't put motd content in /etc/redhat-release [SME: 9161]
291    smeserver-yum
292  Terry Fage  - added centos SCLo SIG gpg rpm signing key [SME: 10102]
293  On behalf of the SME Server development team    will allow to install SCL packages directly from smecontribs
294    
295    General features
296    ================
297    
298    - Based on CentOS 6.9 and all available updates
299    
300    Terry Fage
301    Compilation of release data is thanks to Ian Wells
302    On behalf of the Koozali SME Server development team


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed