Koozali.org: home of the SME Server

Koozali SME Server 8.2 Beta 2 Release Announcement

Offline TerryF

  • grumpy old man
  • *
  • 1,717
  • +2/-0
Koozali SME Server 8.2 Beta 2 Release Announcement
« on: March 30, 2015, 04:57:45 PM »
Koozali SME Server 8.2 Beta2 Release Notes

31 March 2015

The Koozali SME Server (SME Server) development team is pleased to announce
the release of SME Server 8.2 Beta 2 which is based on CentOS 5.11

Bug reports and reports of potential bugs should be raised in the bug
tracker (and only there, please);



You can download SME Server 8.2 Beta 2 from
or for other methods see http://wiki.contribs.org/SME_Server:Download

Please note it may take up to 48 hours for mirrors to finish syncing,
during this time you may experience problems.

About SME Server

SME Server is the leading Linux distribution for small and medium
enterprises. SME Server is brought to you by Koozali Foundation, Inc.,
a non-profit corporation that exists to provide marketing and legal support
for SME Server.

SME Server is freely available under the GNU General Public License and
is only possible through the efforts of the SME Server community.
However, the availability and quality of SME Server is dependent on
meeting our expenses, such as hosting costs, server hardware, etc.

As such, we ask for a donation to offset costs and fund further development.

a) If you are a school, a church, a non-profit organisation or an individual
using SME Server for private purposes, we would appreciate you to contribute
within your means toward the costs associated with hosting, maintenance and

b) If you are a company or an integrator and you are deploying SME Server in
the course of your work to generate revenue, we expect you to make a donation
commensurate with the level of revenue you generate and the number of servers
your have in the field. Please, help the project

Please visit http://wiki.contribs.org/Donate to donate.

Koozali Inc is happy to supply an invoice for any donations received,
simply email treasurer@koozali.org


The development team would like to thank all of those who have involved
themselves with this release.


1. CentOS 5 has dropped support for i586 and therefore SME Server 8.2
   will not work on i586 hardware. [See bugzilla:2845]. i586 hardware
   means processors before and including Intel Pentium, Pentium MMX;
   AMD K5, K6, K6-II, K6-III and Via C3. i686 architecture processors
   are Intel Pentium Pro, Pentium II, Pentium III; AMD Athlon,
   Athlon XP and later.

2. Some notes on SME Server 8.2 including help on upgrades can be found at

3. Please note Upstream policy on Production Phase 3 for EL5. Only those
   security updates deemed crucial are now being released upstream for EL5
   (so also for SME8) The Koozali team recommends that you start moving
   workloads from SME Server 8 to SME Server 9.
   Planned EOL for CentOS 5 is Mar 31 2017

4. Please note it may take up to 48 hours for mirrors to finish syncing,
   during this time you may experience problems.
   You can download SME Server 8.2 from

Changes in this release

Packages altered by Centos, Redhat, and Fedora-associated developers are
not included.

 - Add pkgconfig dar
 - New Upstream Version dar
 - Add requires nfs-utils
 - The nfs service is neither started or allowed to start
 - Workstation Backup, do not create folder in /

 - Make pdbedit output independent from locale and timezone so it can be

 - apply locale 2015-03-14 patch from pootle
 - apply locale 2014-12-25 patch from pootle
 - apply locale 2014-03-08 patch from pootle

Mail Server
 - Updated to ClamAV release 0.98.6
 - Updated to release ClamAV 0.98.5
 - Add BuildRequires for openssl-devel and libxml2-devel
 - Remove Packager and Vendor from ClamAV spec file.
 - Updates to release ClamAV 0.98.4.
 - Updated to release ClamAV 0.98.3.
 - Remove the patch e-smith-email-5.2.0-UEsDBBQDAAAIA-new-signature.patch
 - Add new zip file signatures to default mailpatterns database : UEsDBBQDAAAIA
 - Add new zip file signatures to default mailpatterns database : ZIPVOSX & ZIPV3
 - Fix stunnel path
 - Use stunnel instead of sslio to support TLS
 - Modify whitelist_soft transaction to interact with dnsbl filter
   by John Crisp <jcrisp@safeandsoundit.co.uk>
 - Remove DENYSOFT on SPF softfail qpsmtpd
 - Increase MemLimit to 700M for clamav-0.98
 - Remove dnsbl.ahbl.org RBL List

Server manager
 - Resync with upstream php53, which include
    fileinfo: fix out-of-bounds read in elf note headers. CVE-2014-3710
    xmlrpc: fix out-of-bounds read flaw in mkgmtime() CVE-2014-3668
    core: fix integer overflow in unserialize() CVE-2014-3669
    exif: fix heap corruption issue in exif_thumbnail() CVE-2014-3670
 - Resync with upstream php53, which include
    spl: fix use-after-free in ArrayIterator due to object
    change during sorting. CVE-2014-4698
    spl: fix use-after-free in SPL Iterators. CVE-2014-4670
    gd: fix NULL pointer dereference in gdImageCreateFromXpm.
    fileinfo: fix incomplete fix for CVE-2012-1571 in
    cdf_read_property_info. CVE-2014-3587
    core: fix incomplete fix for CVE-2014-4049 DNS TXT
    record parsing. CVE-2014-3597
 - Resync with upstream php53, which include
    core: type confusion issue in phpinfo(). CVE-2014-4721
    date: fix heap-based buffer over-read in DateInterval. CVE-2013-6712
    core: fix heap-based buffer overflow in DNS TXT record parsing.
    core: unserialize() SPL ArrayObject / SPLObjectStorage type
    confusion flaw. CVE-2014-3515
    fileinfo: out-of-bounds memory access in fileinfo. CVE-2014-2270
    fileinfo: unrestricted recursion in handling of indirect type
    rules. CVE-2014-1943
    fileinfo: out of bounds read in CDF parser. CVE-2012-1571
    fileinfo: cdf_check_stream_offset boundary check. CVE-2014-3479
    fileinfo: cdf_count_chain insufficient boundary check. CVE-2014-3480
    fileinfo: cdf_unpack_summary_info() excessive looping
    DoS. CVE-2014-0237
    fileinfo: CDF property info parsing nelements infinite
    loop. CVE-2014-0238

Web Server
 - Disable SSLv3
 - Revert CRIME mitigation patch, as it's not needed
 - Mitigate CRIME, CVE-2012-4929

Other fixes and updates
 - When quiting the console app with unsaved changes set the default selected
   answer to NO
 - Add a verification in the console of number of pptp clients against ip allowed in dhcpd
 - Add a verification in remoteaccess panel of number of pptp clients against ip allowed in dhcpd
 - Reset primary ibay default type
 - Add a migrate fragment to sanitize the host comment for illegal characters in the server-manager.
   Sanitize existing hostname records, Add a validator for the comment in the hostname field
   Code done by Charlie Brady <charlieb-contribs-bugzilla@budge.apana.org.au>
   and Huib <sme@artixdesign.com>
 - Force SSL following ibays settings to the relevant domain
 - Move mysql logging to multilog
 - Allow ntp status queries from localhost.
 - Avoid uninitialized variable warning from last update.
 - Add ssh-autoblock for external interface - patch by Chris Maltby
 - Update to upstream version 2.3.4, which fixes CVE-2012-3478 and CVE-2012-2252
 - Updated rsync-protocol.patch to fix CVE-2012-2251, and to apply on top of the
   CVE-2012-3478 and CVE-2012-2252 fixes.
 - Updated makefile.patch to preserve RPM CFLAGS.
 - Added command-line-error.patch (from Debian), correcting error message
   generated when insecure command line option is used (CVE-2012-3478 fix
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
 - Add patch for rsync3 compat (#485946)
 - Update smeserver-release for beta1 of SME Server 8.2
 - Set the check update frequency of smecontribs through the server-manager
 - Add a default Yum db property for check4contribsupdates
 - Added a check-update for the smecontribs repository

General features

- Based on CentOS 5.11 and all available updates

Terry Fage
On behalf of the SME Server development team
qui scribit bis legit