/[smeserver]/cdrom.image/sme9/README.txt
ViewVC logotype

Diff of /cdrom.image/sme9/README.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph | View Patch Patch

Revision 1.19 by vip-ire, Wed Dec 9 08:43:49 2015 UTC Revision 1.28 by unnilennium, Thu Apr 27 21:30:12 2017 UTC
# Line 1  Line 1 
1  Koozali SME Server 9.1 Final Release Notes  Koozali SME Server 9.2 Final Release Notes
2  ===========================================  ===========================================
3  09 Dec 2015  
4    26 April 2017
5  The Koozali SME Server (SME Server) development team is pleased to announce  
6  the release of SME Server 9.1 which is based on CentOS 6.7.  The Koozali SME Server (SME Server) development team is pleased to announce
7    the release of SME Server 9.2 Final which is based on CentOS 6.9
8  SME 9.1 incorporates only very minor changes from SME 9.1rc1  
9    Bug reports and reports of potential bugs should be raised in the bug
10  CentOS 6.# has an EOL of 20 Nov 2020.  tracker (and only there, please);
11    
12  Bug reports and reports of potential bugs should be raised in the bug      http://bugs.contribs.org/
13  tracker (and only there, please);  
14    Download
15      http://bugs.contribs.org/  ========
16    
17  Download  You can download Koozali SME Server 9.2 Final from
18  ========  http://mirror.contribs.org/smeserver/releases/9.2/
19  You can download SME Server 9.1 from  or for other methods see http://wiki.contribs.org/SME_Server:Download
20  http://mirror.contribs.org/smeserver/releases/9.1/  
21  or for other methods see http://wiki.contribs.org/SME_Server:Download  Please note it may take up to 48 hours for mirrors to finish syncing,
22    during this time you may experience problems.
23  Please note it may take up to 48 hours for mirrors to finish syncing,  
24  during this time you may experience problems.  About SME Server
25    ================
26  About SME Server  
27  ================  SME Server is the leading Linux distribution for small and medium
28  SME Server is the leading Linux distribution for small and medium  enterprises. Loozali SME Server is brought to you by Koozali Foundation, Inc.,
29  enterprises. SME Server is brought to you by Koozali Foundation, Inc.,  a non-profit corporation that exists to provide marketing and legal support
30  a non-profit corporation that exists to provide marketing and legal support  for SME Server.
31  for SME Server.  
32    SME Server is freely available under the GNU General Public License and
33  SME Server is freely available under the GNU General Public License and  is only possible through the efforts of the SME Server community.
34  is only possible through the efforts of the SME Server community.  However, the availability and quality of SME Server is dependent on
35    meeting our expenses, such as hosting costs, server hardware, etc.
36  However, the availability and quality of SME Server is dependent on  
37  meeting our expenses, such as hosting costs, server hardware, etc.  As such, we ask for a donation to offset costs and fund further development.
38    
39  As such, we ask for a donation to offset costs and fund further development.  a) If you are a school, a church, a non-profit organisation or an individual
40    using SME Server for private purposes, we would appreciate you to contribute
41  a) If you are a school, a church, a non-profit organisation or an individual  within your means toward the costs associated with hosting, maintenance and
42  using SME Server for private purposes, we would appreciate you to contribute  development.
43  within your means toward the costs associated with hosting, maintenance and  
44  development.  b) If you are a company or an integrator and you are deploying SME Server in
45    the course of your work to generate revenue, we expect you to make a donation
46  b) If you are a company or an integrator and you are deploying SME Server in  commensurate with the level of revenue you generate and the number of servers
47  the course of your work to generate revenue, we expect you to make a donation  your have in the field. Please, help the project
48  commensurate with the level of revenue you generate and the number of servers  
49  your have in the field. Please, help the project  Please visit http://wiki.contribs.org/Donate to donate.
50    
51  Please visit http://wiki.contribs.org/Donate to donate.  Koozali Inc is happy to supply an invoice for any donations received,
52    simply email treasurer@koozali.org
53  Koozali Inc is happy to supply an invoice for any donations received,  
54  simply email treasurer@koozali.org  
55    Tony Keane
56  Notes  ============
57  =====  
58  In-place upgrades are not supported. It is necessary to backup and then restore.  It is with huge sadness that we learnt the passing of Tony Keane on Friday
59  /boot partition is always RAID 1.  1st April, 2016. He was a long time user and supporters of Koozali SME Server
60    and one of the founding members of the Koozaly Foundation.
61  The spare handling for RAID arrays is not implemented.  We dedicate this release of SME Server 9.2 to Tony.
62    Without him and a handful of others the community would not have been secured
63  USB installs are now supported, see:  with the Koozali foundation and our current cluster of servers to build and
64  http://wiki.contribs.org/Install_From_USB#SME_Server_9  maintain your favourite distro. If you download and use it,
65    please remember him and his work, and that of all the other contributors
66  Minimal changes have been made from SME9.1rc1  who work tirelessly to make Koozali SME as good as it is.
67    
68  Major changes in this release  We extend our thoughts and deepest sympathies to his family.
69  =============================  
70  Added functionality to use a Dummy NIC for the internal interface.  
71  Set the check update frequency of smecontribs through the server-manager.  https://wiki.koozali.org/Tony_Keane
72  Disable SSLv3.  
73  Added Windows 10 support for SME Domain.  Notes
74    =====
75  Changes in this release  
76  =======================  In-place upgrades are not supported. It is necessary to backup and then restore.
77  Only the changes since SME Server 9.0 are listed, mainly  /boot partition is always RAID 1.
78  autogenerated from the changelogs.  
79    The spare handling for RAID arrays is not implemented.
80  Packages altered by Centos, Redhat, and Fedora-associated developers are  
81  not included.  USB installs are now supported, see:
82    http://wiki.contribs.org/Install_From_USB#SME_Server_9
83  Backups  
84  -------  
85   - dar new upstream version  Major changes in this release
86   - dar add pkgconfig  =============================
87   - The mountpoint is tested before attempting the console backup  
88   - Workstation Backup, do not fail backup for mtime/ctime mismatch  Major Changes in this release. Updated all to Koozali branding. Server Manager - Allow access to the server-manager without SSL from the loopback, Don't redirect to http when login in/out of the server-manager from localhost, Add Bug reporting template. File Server - added W10 support to SME Domain. LDAP - Hook into the new ssl-update event. Mail Server - Update qpsmtpd to release 0.99.6 (including multiple plugins and ability to ebale/disable same), Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default), Modify whitelist_soft transaction to interact with dnsbl filter, Revert forcing TLSv1 patch as it breaks some inbound delivery, Remove karma rcpt handling, Check rua is defined before trying to parse it to prevent an error if a domain has a DMARC entry published with no rua, add support for the uribl plugin, add detailed spamassassin report headers. Web Server - Hook into the new ssl-update event, Set TLSv1 back to enabled (but keep a prop to disable it if needed). Other fixes and updates - Correctly display http URL to the server-manager in the console, Remove motd text from grub.cfg.
89   - Change the sub checkMount() to findmnt Ian Wells <esmith@wellsi.com>  
90   - Add requires nfs-utils  
91   - The nfs service is neither started or allowed to start  Detailed changes in this release
92   - Don't remove the apache group during restore  =======================
93    
94  File Server  Only the changes since SME Server 9.1 are listed, mainly autogenerated from the changelogs.
95  -----------  
96   - The samba performance registry is now added in the win10samba.reg  Packages altered by Centos, Redhat, and Fedora-associated developers are not included.
97   - Fix samba audit parameters  
98     Patch from Jorge Gonzalez  Text for ISO Release Notes with Bug Numbers
99     Replace syslog template to rsyslog so samba audits are logged in the correct  The changelogs are written per package, and each package is assigned a group.
100     file    
101  - The samba performance registry is now added in the win10samba.reg  File Server
102     Corrected typo in patch of bad character '“', relative to roaming profile  
103     e-smith-samba-2.4.0.bz9038.W10_registry.patch  e-smith-samba
104     Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)    - fix outlook error code 0x8004011c when setting up and email account on a win10 computer joined to a domain (with   roaming profiles) [SME: 10106]
105     added W10 support to SME Domain  - Create V6 profile dir (for Win10 roaming profiles) [SME: 9772]
106     e-smith-samba-2.4.0.bz9038.W10_registry.patch  proftpd
107   - Added e-smith-samba-2.4.0.bz9048.RoamingProfileForW8.patch  - Additional tweak (to avoid null pointer dereference) for upstream bug 3868
108     Modified the registry file for roaming profile with W8  - Fix for CVE-2016-3125: usage of 1024 bit DH key even with manual parameters
109     Roaming profiles follow Windows version (.V2,.V3,.V4,.V5)    see (http://bugs.proftpd.org/show_bug.cgi?id=4230)
110   - Add dependency on perl(Crypt::Cracklib), needed for ftpasswd --use-cracklib  - Also fixed related issue where only first DH param in TLSDHParamFile is used,
111     Add -utils subpackage for support tools (#1258440), using a sub-package to    regardless of requested keylength (http://bugs.proftpd.org/show_bug.cgi?id=3868)
112     ensure that the main package does not require perl  - Fix SUID/SGID directory permission setting regression introduced with fix
113     Update ftpasswd to version from proftpd 1.3.5a for additional functionality    for CVE-2012-6095 (#1297264)
114     (SHA passwords, locking and unlocking of accounts)  - Add support for specifying TLSv1.1 and TLSv1.2 (#1281493)
115    
116    LDAP
117  LDAP  
118  ----  e-smith-ldap
119   - Remove size limit for search result  - Disable SSLv3, but keep the possibility to enable it again [SME: 10113]
120   - Make pdbedit output independent from locale and timezone so it can be  - Better default cipher suite, and honor global suite [SME: 10113]
121     parsed  - Hook into the new ssl-update event [SME: 9152]
122   - Symlink /etc/init.d/ldap to /usr/bin/sv  
123   - Chown all DB files to ldap before staring slapd  Localisation
124   - Set checkpoint in slapd.conf instead of DB_CONFIG  
125   - Stop ldap on shutdown (rc0 and rc6)  smeserver-locale
126   - Don't overwrite the ldif dump if slapcat's output is empty  - apply locale 2017-03-16 patch from pootle [SME: 9592]
127     (code from Charlie Brady)  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
128   - Run db_recover on startup    by assuming the date is correct and changing the weekday.
129   - Don't wipe LDAP DB when the ldif dump is empty  
130    Mail Server
131  Localisation  
132  ------------  clamav
133   - apply locale smeserver-locale-2.4.0-locale-2015-07-12.patch  - Update to release 0.99.2 [SME: 9489]
134   - apply locale smeserver-locale-2.4.0-locale-2015-07-01.patch  - Add pcre-devel to BuildRequires [SME: 9151]
135   - apply locale 2015-03-14 patch from pootle  e-smith-pop3
136   - apply locale 2014-12-25 patch from pootle  - Hook into a new ssl-update event [SME: 9152]
137    - Allow setting SSL protocols from DB (and set TLSv1 back to enabled
138  Mail Server    on a default install) [SME: 9175]
139  -----------  - Disable TLSv1 [SME: 9169]
140   - ClamAV Updated to release 0.98.7  e-smith-qmail
141   - Remove the patch e-smith-email-5.4.0-UEsDBBQDAAAIA-new-signature.patch  - Add possibility to exclude users or members of other groups from group
142   - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA    email address [SME: 9540]
143   - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3  qmail
144   - Disable fips mode on stunnel  - Consider literal <> as null sender [SME: 9883]
145   - Use stunnel instead of sslio to support TLS  qpsmtpd
146   - Revert forcing TLSv1 patch as it breaks some inbound delivery  - Removed Message-Id validation, as it rejects MS account validation email [SME: 9773]
147   - Revert whitelist_soft dnsbl as it hasn't been verified yet and we need to  - fix whitelist plugin to support helo with naughty rejecting at mail stage [SME: 10111]
148     push the fix for TLSv1  - Validate domains found in uribl with Data::Validate::Domain [SME: 9499]
149   - Modify whitelist_soft transaction to interact with dnsbl filter  - Use eval to fetch dkim policies, prevent fatal errors in case of DNS
150     by John Crisp <jcrisp@safeandsoundit.co.uk>    timeout [SME: 9504]
151   - Force usage of TLSv1  - Remove karma rcpt handling (buggy and doesn't make a lot of sense) [SME: 9502]
152   - Increase MemLimit to 700M for clamav-0.98  - Check rua is defined before trying to parse it to prevent an errorif a domain has a DMARC
153   - Allow custom passdb args    entry published with no rua [SME: 9507]
154   - allow IP relayclient stored by DB  - Fix error when RCPT TO is not valid [SME: 8861]
155     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - Fix karma logic by checking negative strikes [SME: 9502]
156     & Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>  - Backport a fix for karma_tool so it can find its database [SME: 9502]
157   - allow IP relayclient stored by DB  - Update to 0.96 (with some backports from GIT head) [SME: 8861]
158     Code from Stefano ZAmboni <zamboni@mind-at-work.it>  - Allow reading SSL_version from the tls_protocols config file (and turn TLSv1 back on by default)
159      [SME: 9162]
160  Server manager  - Correctly log login attempts with nulls in login name [SME: 9167]
161  --------------  - Disable TLSv1 [SME: 9162]
162   - fix gzfile accept paths with NUL character #1213407  qpsmtpd-plugins
163   - fix patch for CVE-2015-4024  - remove whitelist_soft [SME: 10125]
164   - fix more functions accept paths with NUL character #1213407  smeserver-clamav
165   - soap: missing fix for #1222538 and #1204868  - Disable unofficial sigs for filesystem scans [SME: 9142]
166   - core: fix multipart/form-data request can use excessive  smeserver-dovecot
167     amount of CPU usage CVE-2015-4024  - Better default cipher suite, and honor global suite [SME: 10114]
168   - fix various functions accept paths with NUL character  - Hook into the new ssl-update event [SME: 9152]
169     CVE-2015-4026, #1213407  - Allow settings SSL protocols from DB (and set TLSv1 back to enabled on a default install)
170   - ftp: fix integer overflow leading to heap overflow when    [SME: 9175]
171     reading FTP file listing CVE-2015-4022  - Disable TLSv1 [SME: 9175]
172   - phar: fix buffer over-read in metadata parsing CVE-2015-2783  smeserver-qpsmtpd
173   - phar: invalid pointer free() in phar_tar_process_metadata()  - updated regex for SBList in smeserver-qpsmtpd-2.4.0-change_rbl_sbl_list_separator.patch to take into
174     CVE-2015-3307    account list using a subdomain [SME: 10116]
175   - phar: fix buffer overflow in phar_set_inode() CVE-2015-3329  - Set the default helo policy to lenient [SME: 9767]
176   - phar: fix memory corruption in phar_parse_tarfile caused by  - Turn SPF and DMARC rejects off by default [SME: 9654]
177     empty entry file name CVE-2015-4021  - Fix disabling DMARC reporting [SME: 9507]
178   - soap: more fix type confusion through unserialize #1222538  - Remove o and r DKIM fields as they are not standard [SME: 9506]
179   - soap: more fix type confusion through unserialize #1204868  - In qpsmtpd-print-dns set DKIM options after the public key so the string will still be splitted correctly [SME: 9506]
180   - core: fix double in zend_ts_hash_graceful_destroy CVE-2014-9425  - Fix a syntax error in the qpsmtpd-print-dns script [SME: 9507]
181   - core: fix use-after-free in unserialize CVE-2015-2787  - Remove warning about spool dir permission on startup [SME: 9511]
182   - exif: fix free on unitialized pointer CVE-2015-0232  - Add missing patch for DKIM signing [SME: 9506]
183   - gd: fix buffer read overflow in gd_gif.c CVE-2014-9709  - Add missing run time dependency on perl(DBD::SQLite) [SME: 9507]
184   - date: fix use after free vulnerability in unserialize CVE-2015-0273  - Check SPF for inbound emails [SME: 9505]
185   - enchant: fix heap buffer overflow in enchant_broker_request_dict  - Check DKIM for inbound emails [SME: 9504]
186     CVE-2014-9705  - Check DMARC for inbound emails (based on the previous SPF and DKIM checks) [SME: 9507]
187   - phar: use after free in phar_object.c CVE-2015-2301  - Store and send DMARC aggregate reports [SME: 9507]
188   - soap: fix type confusion through unserialize  - Support DKIM signing for outbound emails [SME: 9506]
189   - fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710  - Use an additional badrcptto file list for external connections so local only pseudonymes work as expected [SME: 9503]
190   - xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668  - Enable the bogus_bounce plugin [SME: 9501]
191   - core: fix integer overflow in unserialize() CVE-2014-3669  - Use the naughty plugin to defer rejections, leaving users an opportunity to authenticate [SME: 9500]
192   - exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670  - Add support for the uribl plugin [SME: 9499]
193   - spl: fix use-after-free in ArrayIterator due to object  - Change separator for SBList and RBLlist from : to , [SME: 9498]
194     change during sorting. CVE-2014-4698  - Switch to the clamdscan plugin [SME: 9497]
195   - spl: fix use-after-free in SPL Iterators. CVE-2014-4670  - Enabe the loadcheck plugin [SME: 9508]
196   - gd: fix NULL pointer dereference in gdImageCreateFromXpm.  - Add support for the karma plugin [SME: 9502]
197     CVE-2014-2497  - Work with qpsmtpd 0.96 [SME: 8861]
198   - fileinfo: fix incomplete fix for CVE-2012-1571 in  - Expand all ssl related conf in ssl-update [SME: 9152]
199     cdf_read_property_info. CVE-2014-3587  - Hook into a new ssl-update event [SME: 9152]
200   - core: fix incomplete fix for CVE-2014-4049 DNS TXT  - Allow setting SSL protocols from DB [SME: 9162]
201     record parsing. CVE-2014-3597  smeserver-spamassassin
202   - core: type confusion issue in phpinfo(). CVE-2014-4721  - Rewrite spamd run script to add support for --allow-tell [SME: 10138]
203   - date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712  - Add X-Spam-Details header (and simplify X-Spam-Status) [SME: 9509]
204   - core: fix heap-based buffer overflow in DNS TXT record parsing.  - Disable ipv6 support to prevent a warning during startup [SME: 9153]
205     CVE-2014-4049  
206   - core: unserialize() SPL ArrayObject / SPLObjectStorage type  Server manager
207     confusion flaw. CVE-2014-3515  
208   - fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270  e-smith-manager
209   - fileinfo: unrestricted recursion in handling of indirect type  - add a panel to ease reporting bugs [SME: 10238]
210     rules. CVE-2014-1943  - fix typo in e-smith-manager-2.6.0-bz10187-emptyback.patch [SME: 10187]
211   - fileinfo: out of bounds read in CDF parser. CVE-2012-1571  - avoid internal server error if empty back parameter [SME: 10187]
212   - fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479  - fix too short timeout in server-manager [SME: 10186]
213   - fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480  - reapply patch 4
214   - fileinfo: cdf_unpack_summary_info() excessive looping  - Update server-manager to Koozali branding [SME: 9678]
215     DoS. CVE-2014-0237  - move fix to the right line to be effective [SME: 9920]
216   - fileinfo: CDF property info parsing nelements infinite  - fix bad redirection parameter that might reveal session information to remote site temporarily
217     loop. CVE-2014-0238    reverting patch 4 for fast release of security fix please put it back at next release  [SME: 9920]
218   - add php_get_module_initialized internal function (#1053301)  - Update server-manager to Koozali branding [SME: 9678]
219   - soap: fixRFC2616 transgression (#1045019)  - e-smith-manager-2.6.0-Koozali_manager.patch better syntax for removing Indexes option for the manager [SME: 9589]
220   - fix static calling in non-static method (#953786)  - Remove index option for manager's resources [SME: 9589]
221   - fix autoload called from closing session (#954027)  - fix 307 redirection to http when https is used [SME: 8825]
222   - drop unneeded part of CVE-2006-724.patch and fileinfo.patch  - update syntaxe for TKT Auth, bump 7 for typo, corrected typo in e-smith-manager-2.4.0
223     extension not provided or git binary patches (#1064027)  - dont_rewrite_to_https_from_localhost.patch code from John H. Bennett III bennettj@johnbennettservices.com [SME: 9271]
224   - odbc: fix incompatible pointer type (#1053982)  - Really don't redirect to http when login in/out of the server-manager [SME: 9163]
225   - mysqli: fix possible segfault in mysqli_stmt::bind_result  - Don't redirect to http when login in/out of the server-manager from localhost [SME: 9163]
226     php bug 66762 (#1069167)  - Allow access to the server-manager without SSL from the loopback [SME: 9163]
227   - mysql: fix php_mysql_fetch_hash writes long value into int  php
228     php bug 52636 (#1054953)  - don't set environmental variable based on user supplied Proxy request header CVE-2016-5385
229    - fix wrong warning in openssl_encrypt() for missing IV when IV is not required #1260315
230  Web Server  - fix segfault's when you try and allocate an SplFixedArray with size >= 9999 #1071344
231  ----------  - segfault in php_pgsql_meta_data CVE-2015-4644 #1234434
232   - DIsable SSLv3  - add options to enable TLS in curl #1255920
233   - Revert CRIME mitigation patch, as it's not needed  - fix segfault in gc_collect_cycles #1122681
234   - Mitigate CVE-2012-4929  
235   - Turn SSLEngine on in the SSL vhost (ProxyPassVirtualHosts)  Webmail and Groupware
236   - Remove obsolete gpc_order setting from php.ini.  
237   - Add an upload_tmp_folder setting by db command  
238   - Thanks to Michael McCarn and Jean-philippe Pialasse  Web Server
239    
240  Other fixes and updates  e-smith-apache
241  -----------------------  - Hook into the new ssl-update event [SME: 9152]
242   - Update /etc/mime.types templates  - Set TLSv1 back to enabled (but keep a prop to disable it if needed) [SME: 9154]
243   - Use sha256 algorithm for signature of SSL cert.  - Disable TLSv1 [SME: 9154]
244   - Added new createlinks function event_templates event_actions event_services  
245   - Don't claim to own /sbin and /sbin/e-smith  Other fixes and updates
246   - display variable name in the server-manager $domainName, $domainDesc $domain  
247   - Revert the upload_tmp_folder patch as it needs some more work  e-smith-base
248   - Add dummy NIC support as InternalInterface  - Use ip route syntax to define routes to local network [SME: 9905]
249   - Only fire the ip-change event when IP is assigned to WAN nic  - Allow /32 masks on the external interface, in which case we don't
250     (Code by Charlie Brady and John Crisp)    check if the gateway is on the correct network) [SME: 9765]
251   - Only reset service access when switching to or from private server mode  - Add a column to display forwarding address [SME: 9174]
252     (Code by Charlie Brady)  - Correctly display http URL to the server-manager in the console [SME: 9163]
253   - When quiting the console app with unsaved changes set the default selected  - Fire ssl-update event when default cert is renewed [SME: 2257]
254     answer to NO  - Expand /home/e-smith/ssl.pem/pem during ssl-update [SME: 9152]
255   - Added a comment to specify the real configuration file of dhcpd  e-smith-devtools
256   - Modified the patch of daniel e-smith-base-5.6.0-ensure_apache_alias_www.patch  - Quote filenames in genfilelist so filenames containing spaces are correctly
257   - Ensure www group exists and that apache is an alias of www    handled [SME: 9758]
258   - Check where running runlevel 4, not 7 in service wrapper  e-smith-grub
259   - Correctly update NIC configuration on single NIC systems  - Remove motd text from grub.cfg [SME: 9161]
260   - Symlink udev-post service in rc7  e-smith-hosts
261   - Fix PPPoE after a post-upgrade  - Allow empty comment when creating/modifying a hostname [SME: 9177]
262   - Remove dependency on microcode_ctl  e-smith-ibays
263   - Prevent emailing about the normal, weekly, checks of RAID arrays, by Mark Casey  - Remove double / in SSL RewriteRule [SME: 9195]
264   - Don't claim to own /sbin and /sbin/e-smith  e-smith-lib
265   - Add an upload_tmp_folder setting by db command  - Adjust regex so adjust-service accepts sigusr1 and sigusr2 from files [SME: 9184]
266     Thanks to Michael McCarn and Jean-philippe Pialasse  e-smith-proxy
267   - the folder /tmp is created by the event init-ibays  - Allow custom file descriptor limit, and set default to 4096 [SME: 9911]
268   - the event ibay-modify create/chown/chmod the folder /tmp  initscripts
269   - Add an upload_tmp_folder setting by db command  - Rebase on upstream 9.03.53-1 [SME: 9534]
270     Thanks to Michael McCarn and Jean-philippe Pialasse  - Roll in CentOS Branding
271   - Force SSL following ibays settings to the relevant domain  - functions: parse -d first
272   - Perl::critic syntax modifications  - functions: fix ignored delay in killproc
273   - Add more PHP options to ibays only by db commands  - netfs: only unmount loopback device mounted on top of netdev or with back-file on netdev
274   - Add SSLRequireSSL to ibays when SSL is set to enabled  - functions: improve killing loops
275   - Allow the admin upsd in /etc/hosts.allow  - netfs: tweak nfs umount
276   - Creation Admin Privilege for use of upscmd & upsrw  - sysctl.conf: mention sysctl -a
277   - Remove obsolete directives {allowfrom}  - sysconfig.txt: document PPPOE_EXTRA and PPPD_EXTRA
278   - Access property created (default value is 'localhost')  - spec: require plymouth
279   - Remove obsolete directives {ACL,ACCEPT,REJECT} and switch to LISTEN  - fix mangled sysconfig/init.s390
280     in /etc/ups/upsd.conf  - rc.sysinit: don't perform fsck twice with /.autorelabel
281   - Allow NUT in /etc/hosts.allow and in /etc/services  - ifdown-eth: fix comparison
282     Code change from Daniel B.<daniel@firewall-services.com>  - ifup-eth: if arping fails, output responding MAC
283   - Revert the patch e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - network-functions: fix change_resolv_conf after grep update
284   - Duplicate hostnames with different IP are not used, a warn in log is printed  - spec: add sysctl.d dir
285   - The server hostname can not be used by a dhcp client, a warning in log is printed  - rc.sysinit: fix typo in fs
286   - Changed the name of /tmp/dhcpd.leases to /tmp/tmpdhcpd.leases  - rename_devices: comments need to have a blank before them
287     when the dhcpd lease is modified  - rename_device: remove comments and trailing whitespaces
288   - Do template-expand of /var/service/tinydns/root/data  - bonding: warn if the ifup for slave device failed
289   - Do sigus1 of dhcp-dns & dnscache  - clarify daemon() usage message
290   - Forked DHCPparse for parsing the end of lease and remove old entry of dnscache  - ifdown: clean ipv4 localhost addresses
291   - Require perl-Text-DHCPparse removed  - ifup-post: check resolve.conf also with DNS2
292   - Timestamp added in tinydns, the entry in dnscache is cleared when the lease is over  - ifup: add missing quotes
293   - Add new feature 'Parse dhcpd.leases and feed to tinydns'  - ifup-eth: some bridge options are applied later
294   - e-smith-tinydns-2.4.0_add_hostname_following_dhcpdleases_hostname.patch  - init.d/halt: give init some time to reexecute
295     made from the solution of Stefano Zamboni  - network-scripts: DEVICE and HWADRR could be quoted by apostrophe
296   - Make slapd service an alias for ldap  - ifup-wireless: fix calling of phy_wireless_device
297   - Switched to sysvinit from systemd (it's rhel-6)  - rc.sysinit: apply quotas after system is relabeled
298   - Fixed license tag Related: rhbz#632853  mod_auth_tkt
299   - pptpd New version  - backport to SME9 fix redirection when proxy ssl [SME: 8825]
300   - Dropped pppd-unbundle patch (upstreamed)  - update apxs path for SME9 (sbin)
301   - Various fixes according to Fedora review Related: rhbz#632853  smeserver-release
302   - Modified for Fedora Resolves: rhbz#632853  - Bump for beta1 release of 9.2 [SME: 9525]
303   - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252  smeserver-support
304   - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the  - updated sources with new pictures fix hover color [SME: 9678]
305     CVE-2012-3478 and CVE-2012-2252 fixes.  - Koozali branding of manager [SME: 9678]
306   - Updated makefile.patch to preserve RPM CFLAGS.  - Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,by assuming the date is correct and changing the weekday.
307   - Added command-line-error.patch (from Debian), correcting error message  - Update copyright in server-manager footer [SME: 9266]
308     generated when insecure command line option is used (CVE-2012-3478 fix  - Don't put motd content in /etc/redhat-release [SME: 9161]
309     regression).  smeserver-yum
310   - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild  - added centos SCLo SIG gpg rpm signing key [SME: 10102]
311   - Add patch for rsync3 compat (#485946)    will allow to install SCL packages directly from smecontribs
312   - Update runit to 2.1.2  
313   - Remove now uneeded obsolete directives  General features
314   - Remove openssl from the Exclude list of centos repo  ================
315   - Add a default Yum db property for check4contribsupdates  
316   - Added a check-update for the smecontribs repository  - Based on CentOS 6.9 and all available updates
317   - Move protected package list to the correct location  
318    Terry Fage
319  General features  Compilation of release data is thanks to Ian Wells
320  ================  On behalf of the Koozali SME Server development team
 - Based on CentOS 6.7 and all available updates  
   
 Terry Fage  
 On behalf of the SME Server development team  


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed