Release Notes CPS 5.8.14
Collax Platform Server
02.12.2015
Installation Notes
Update Instructions
To install this update please follow the following steps:
Procedure
- It is highly recommended to backup of all server data with the Collax backup system before proceeding. Check that the backup was successful before proceeding with the update (this can be done within the backup information email).
- In the administration interface go to System → System Operation → Software → System Update and press Get Package List. This will download the listed update packages. If successful the message Done! will be displayed on the screen.
- Click Get Packages to download the update packages.
- Click Install. This installs the update. The end of this process is indicated by the message Done!.
- A new kernel will now be installed. The system will reboot automatically after installing the update. An appropriate note will be shown if the update process is completed.
New in this Version
GUI: Optimized Job Notification
Status and Notification of changes are performed in the background. Such changes are listed in the web administration interface. With this update optimizations regarding the stability of the webbrowser are beeing implemented. The notification requires less CPU ressources of the webbrowser from now on.
Zarafa Groupware: New Version 7.1.14
With this Collax software update the new version 7.1.14 of Zarafa Groupware is going to be installed. Please find details here:
Add-on Software: Improved Patternhandling of Avira Antivir
This update improves the pattern handling of Avira Antivir.
Hardware: Driver Update for the Dialogic Diva ISDN card
This update contains a new kernel with a driver update divas4linux-melware-3.1.6 for the Diva ISDN card.
Issues Fixed in this Version
Security: Internet Domain Name Server Bind
In the source code of the Internet Domain Name Server security holes have been discovered. These holes will be closed within this software update to Bind version 9.9.7.3
Assigned Common Vulnerabilities and Exposures (CVE) numbers:
Security: Scripting Language PHP5 and PHP Libraries
In the source code of PHP5 security holes have been discovered. These holes will be closed within this software update to PHP 5.6.14. See PHP 5.6.14 Changelog
Security: Remote Login Program OpenSSH
In the source code of OpenSSH security holes have been discovered. These holes will be closed within this software update to OpenSSH 7.0p1