QTS build 20190119

Welcome note and must-know for QNAP Forum members.
Post Reply
New here
Posts: 5
Joined: Fri Oct 05, 2018 2:22 pm

QTS build 20190119

Post by abbychou » Wed Jan 23, 2019 2:48 pm

QTS build 20190119

Download links:


Release note:

QTS build 20190119

[Important Notes]
- All NAS models supported by QTS 4.4.0 use Kernel 4.14.
- To learn more about NAS models that support the TR-004, see the Compatibility List at https://www.qnap.com/en/compatibility-expansion
- To use a TR-004 external RAID enclosure to expand NAS storage space, the enclosure must have exactly one external RAID group. Individual disks cannot be used to expand NAS space.
- The RADVD service previously did not have an outgoing interface. Please reconfigure the RADVD service after upgrading.
- Due to security concerns, support for "Wi-Fi ad-hoc mode" has been removed.
- For the status of QTS updates and maintenance for your NAS model, visit https://www.qnap.com/en/product/eol.php

[New feature]
Storage & Snapshot
- Added support for using a TR-004 external RAID enclosure in NAS Storage mode to expand NAS storage space.
- Added support for using a TR-004 external RAID enclosure in External Storage mode for data transfer.

[Known Issues]
- When data is being transferred to or from a QNAP external RAID enclosure, changes to the status of a degraded RAID group might not be visible immediately in Storage & Snapshots.
- When an external RAID group is in degraded mode its read/write performance will be greatly reduced.
- A failed external RAID group may have the status "Unknown" instead of "Failed".
- When creating an external RAID partition on a TR-004 external RAID enclosure, QTS may detect the new partition and show a notification message before the creation process has finished.
- When an TR-004 external RAID enclosure is connected to the NAS, changing the enclosure's RAID configuration using the hardware Mode switch might cause the status of its external RAID group or disks to change to "Error". To resolve this issue, update the enclosure firmware to the latest version.

[Fixed Issues]
- Fixed multiple vulnerabilities in Apache HTTP Server.
- Fixed a command injection vulnerability in File Station (CVE-2018-0730).
- Fixed multiple vulnerabilities in PHP.
- Fixed a vulnerability in Samba that could be exploited to cause CNAME loops in Active Directory DNS servers (CVE-2018-14629).
- Fixed a double-free vulnerability in Samba Key Distribution Center (KDC) on an Active Directory domain controller (CVE-2018-16841).
- Fixed a null pointer dereference vulnerability in Samba Active Directory domain controller LDAP servers (CVE-2018-16851).
- Fixed a cross-site scripting vulnerability in Storage & Snapshots (CVE-2018-0713).
- Fixed two side-channel vulnerabilities in Linux Kernel (CVE-2018-3639 and CVE-2018-3640).

Post Reply

Return to “Announcements”