General Information
On 10th of June the following was released: :
- ISL Conference Proxy 3.5.8 for Windows 32bit (Platform=win32, Revision=34629, release_date=2014-02-18, os_version=0x5020000-0x7fffffff)
- ISL Conference Proxy 3.5.8 for Windows 64bit (Platform=win64, Revision=34629, release_date=2014-02-18, os_version=0x5020000-0x7fffffff)
- ISL Conference Proxy 3.5.8 for Linux 32bit (Platform=linux, Revision=34629, release_date=2014-02-18)
- ISL Conference Proxy 3.5.8 for Linux 64bit (Platform=linux64, Revision=34629, release_date=2014-02-18)
Modules
- ISL Groop 3.0.3 (release_date=2014-02-18,revision=34676)
Update availability
All updates have release date set to 2014-02-18. Your ESS will need to be same or higher to be able to update your server. This release is available to all countries except Japan.
Upgrading to new version
This are server side updates so hosted service users do not need to do anything.
Server license users please check Upgrading Server License
Improvements
New features
ISL Conference Proxy - Core - HTTP/FastCGI frontend support [ISLCONFPROXY-347] More
DescriptionAdded support for HTTP/FastCGI on ISL Conference Proxy. This feature can be used if Apache web proxy is used for proxying traffic for ISL Conference Proxy. Settings for enabling proxy traffic is located on configuration page of ISL Conference Proxy in Configuration -> Advanced -> Web server. Apache HTTP server 2.4 was tested and is compatible with ISL Conference Proxy.
Defect fixes
ISL Conference Proxy - Core - openssl 1.0.1g is insecure, upgrade to 1.0.1h [ISLCONFPROXY-358] More
DescriptionOpenSSL library which was used for encrypting connections has a security vulnerability and was replaced with a newer version which has the issue fixed.
Description of the security vulnerability : CVE-2014-0224
The defect was fixed.
ISL Groop - Module - V2 pages do not respect disabled status [ISLGROOP-432] More
DescriptionIf users set ISL Groop to disabled and user interface version 2 was used, users were still able to create/modify/delete meetings even though they should not be able to. User interface version 2 was redesigned and now checks for disabled status and users without permission should no longer be able to perform actions such as create/modify/delete meeting.
The defect was fixed.
ISL Groop - Module - Cannot select program version if joining session from ISL Groop list of meetings [ISLGROOP-439] More
DescriptionWhen selecting version of ISL Groop program in the list of meeting, the meeting was not joined with selected version of ISL Groop program. Javascript was redesigned, users should be able to join the meeting with selected version of program.
The defect was fixed.
ISL Groop - Module - Magnifier icon is set too low on search for meeting [ISLGROOP-440] More
DescriptionWhen using the search form for searching ISL Groop meeting, the magnifier icon was moved below the search form input. The style was redesigned, magnifier icon is now positioned correctly.
The defect was fixed.
ISL Groop - Module - Missing translation in meeting datepicker [ISLGROOP-442] More
DescriptionUsers may have seen untranslated text in ISL Groop web interface when creating meeting. The untranslated text was inside date picker. The text is now correctly translated.
The defect was fixed.
ISL Groop - Module - Meeting list does not work in IE7 [ISLGROOP-443] More
DescriptionUsers may have experienced empty ISL Groop meeting list when using Internet Explorer 7. Javascript was updated to also support Internet explorer 7, users should no longer receive empty list of ISL Groop meetings.
The defect was fixed.
ISL Groop - Module - Missing translation : Failed to send invitations [ISLGROOP-448] More
DescriptionUsers may have found untranslated text - "Failed to deliver invitations to:". The text is now correctly translated.
The defect was fixed.
ISL Groop - Module - upgrade openSSL version [ISLGROOP-449] More
DescriptionOpenSSL library which was used for encrypting connections has a security vulnerability and was replaced with a newer version which has the issue fixed.
Description of the security vulnerability : CVE-2014-0224
The defect was fixed.