User Guide for Juniper NETWORKS models including: CTP151, CTP151 CTPView Server Software, CTPView Server Software, Server Software, Software

Juniper Networks CTPView Server Software Release 9.2R2

Juniper Networks CTPView Server Software Release 9.2R2

16 ott 2024 — About This Guide. Release Highlights. Resolved Issues in CTPView Release 9.2 ... Table 9: Critical or Important CVEs Included in postgresql. CVE-2023-5869.


File Info : application/pdf, 7 Pages, 85.62KB

PDF preview unavailable. Download the PDF instead.

ctpview-release-notes-92r2
Juniper Networks® CTPView Server Software Release 9.2R2

Published
2024-10-16

RELEASE

ii
Table of Contents
About This Guide Release Highlights Resolved Issues in CTPView Release 9.2R2 Known Issues in CTPView Release 9.2R2 Required Install files Recommended System Configuration for Hosting a CTPView Server CTPView Installation and Maintenance Policy CVEs and Security Vulnerabilities Addressed in CTPView Release 9.2R2 Revision History

1
About This Guide
This release notes accompany Release 9.2R2 of the CTPView software. They describe device documentation and known problems with the software. You can also find these release notes on the Juniper Networks CTP software documentation webpage, which is located at CTP Series Release Notes.

Release Highlights

The following features or enhancements have been added to CTPView Release 9.2R2. · SAToP bundles is now interoperable with Cisco. · You can now configure Save/Restore CTP configuration feature in CTPView. · CTPOS Release 9.2R2 is supported on CTP151 device only. You can upgrade to CTPOS 9.2R2 from CTPOS 9.2R1 using CTPView 9.2R2. Table 1: CTPOS Upgrade Path

Model / Platform

Existing CTPOS Version

Version Path

CTP151

9.1R1/9.1R2/9.1R3-x/ 9.1R5/9.1R6-x

9.1R1/9.1R2/9.1R3-x/ 9.1R5/9.1R6-x> 9.2R1 dual -> 9.2R2

· Upgrading CTP node to 9.2R2 using CTPView 9.2R2 1. First, dual upgrade the CTP Node to 9.2R1. 2. Then, to upgrade the CTP node to 9.2R2 using CTPView, copy ctp_complete_9.2R2_241015.tgz in /ctp of CTPView 9.2R2.
3. Select Node Maintenance > Upgrade CTP Software.

2
Resolved Issues in CTPView Release 9.2R2
The following issues have been resolved in CTPView Release 9.2R2. · SAToP bundles do not interoperate with Cisco [PR 1838126] · Save/Restore CTP configuration feature is not able configure in CTPView [PR 1841562]
Known Issues in CTPView Release 9.2R2
The following PR is a known issue. · SSH fails after CTP151 dual upgrade to CTPOS 9.2R1 from CTPView. [PR 1830027]
NOTE: You cannot configure PBS in CTPView 9.2R2.

Required Install files

It is your responsibility to install CentOS on a VM, and the CentOS version must be 7.5.1804 (http:// vault.centos.org/7.5.1804/isos/x86_64/).
Installing newer releases of Centos are not supported you must use Centos 7.5.1804. If you have queries or need further assistance, contact Juniper Networks Technical Assistance Center (JTAC).
Following file is provided for installing the CTPView software: Table 2:

File

CTPView Server OS

Filename

Checksum

Software and Centos OS updates

Centos 7.5

CTPView-9.2R-2.0.el7.x8 4ef2dc5242a8e2cbe7c63

6_64.rpm

b26f9d73a5c

3

Table 2: (Continued)
File Web Update

CTPView Server OS

Filename

Checksum

web_update_9.2R2_2410 4abbe47e7ad7c496a7f14

15.tgz

4167f5a4e40

Recommended System Configuration for Hosting a CTPView Server
The following are the recommended hardware configuration to setup a CTPView 9.2R2 server: · CentOS 7.5.1804 (64-bit) · 1x processor (4 cores) · 4 GB RAM · Number of NICs ­ 2 · 80 GB Disk space
CTPView Installation and Maintenance Policy
From the release of CTPView 9.0R1, Juniper Networks has adopted a policy for installation and maintenance of the CTPView server. CTPView is now being distributed as an "Application only" product, in the form of an RPM package. You can now install and maintain the OS (CentOS 7.5) according to the guidelines described in CTPView Network Management System Administration. This administration guide also has the complete installation procedure.

4

CVEs and Security Vulnerabilities Addressed in CTPView Release 9.2R2

The following tables list the CVEs and security vulnerabilities that have been addressed in CTPView 9.2R2. For more information about individual CVEs, see http://web.nvd.nist.gov/view/vuln/search.
Table 3: Critical or Important CVEs Included in bind

CVE-2023-3341

CVE-2023-4408

CVE-2023-50387

CVE-2023-50868

Table 4: Critical or Important CVEs Included in glibc

CVE-2024-2961

CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602

Table 5: Critical or Important CVEs Included in grub2 CVE-2022-2601

Table 6: Critical or Important CVEs Included in kernel

CVE-2023-3609

CVE-2023-32233

CVE-2023-35001

CVE-2023-42753

Table 7: Critical or Important CVEs Included in libssh2 CVE-2020-22218

Table 8: Critical or Important CVEs Included in linux-firmware

CVE-2020-12321

CVE-2023-20569

CVE-2023-20593

CVE-2023-20592

Table 9: Critical or Important CVEs Included in postgresql CVE-2023-5869

Table 10: Critical or Important CVEs Included in python

5

CVE-2023-40217

Table 11: Critical or Important CVEs Included in openssh

CVE-2023-48795

CVE-2023-51384

CVE-2023-51385

Revision History
October 2024--Revision 1--CTPView Release 9.2R2

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2024 Juniper Networks, Inc. All rights reserved.



References

AH XSL Formatter V6.6 MR1 for Windows (x64) : 6.6.2.35616 (2018/10/15 18:42JST) Antenna House PDF Output Library 6.6.1317 (Windows (x64))