User Guide for Juniper NETWORKS models including: 9.1R5-1, CTPView Server Software, Software

Juniper Networks CTPView Server Software Release 9.1R5-1


File Info : application/pdf, 7 Pages, 72.58KB

PDF preview unavailable. Download the PDF instead.

ctpview-release-notes-91r5-1
Juniper Networks® CTPView Server Software Release 9.1R5-1

Published
2024-09-18

RELEASE

ii
Table of Contents
About This Guide Release Highlights Resolved Issues in CTPView Release 9.1R5-1 Known Issues in CTPView Release 9.1R5-1 Required Install files Recommended System Configuration for Hosting a CTPView Server CTPView Installation and Maintenance Policy CVEs and Security Vulnerabilities Addressed in CTPView Release 9.1R5-1 Revision History

1
About This Guide
This release notes accompany Release 9.1R5-1 of the CTPView software. They describe device documentation and known problems with the software. You can also find these release notes on the Juniper Networks CTP software documentation webpage, which is located at CTP Series Release Notes.
Release Highlights
The following features or enhancements have been added to CTPView Release 9.1R5-1.
NOTE: · CTPOS 9.1R5-1 is CTP 151-specific. However, CTPView software can manage both CTP151
and CTP2000 Series devices, but note that version of the CTPOS image on CTP2000 Series devices must be less than CTPOS Release 9.1R5. · You cannot use CTPView to perform the CTP Node upgrade from 9.1Rx to 9.1R5-1. However, you can manually upgrade from CTPOS 9.1Rx to 9.1R5-1 using CTPOS CLI. See Table 1 on page 2 of CTPView 9.1R5 Release Notes
· OpenSSH Vulnerability (CVE-2024-6387) is fixed. [PR 1821683] · CTPView vulnerabilities that were found in 9.1R3 are addressed and fixed. [PR 1827420] · Nessus scan vulnerabilities (Kernel, Linux-firmware, Postgresql) are fixed. [PR 1821688]
Resolved Issues in CTPView Release 9.1R5-1
The following issues have been resolved in CTPView Release 9.1R5-1. · CVE-2024-6387 - OpenSSH Remote Code Execution (RCE) [PR 1821683] · Need hotfix for CTPView vulnerabilities in 9.1R3 [PR 1827420]

2 · Nessus scan vulnerabilities : Kernel, Linux-firmware, Postgresql. [PR 1821688]

Known Issues in CTPView Release 9.1R5-1
None.

Required Install files

It is your responsibility to install CentOS on a VM, and the CentOS version must be 7.5.1804 (http:// vault.centos.org/7.5.1804/isos/x86_64/).
Installing newer releases of Centos are not supported you must use Centos 7.5.1804. If you have queries or need further assistance, contact Juniper Networks Technical Assistance Center (JTAC).
Following file is provided for installing the CTPView software: Table 1:

File

CTPView Server OS

Filename

Checksum

Software and Centos OS updates
This includes CTPView software and security updates.

Centos 7.5

CTPView-9.1R-5.1.el7.x8 14a9772e954ea5d79da5

6_64.rpm

5e19bd3839b1

Software updates
This includes CTPView software.

Centos 7.5

web_update_9.1R5-1_24 7af71dfae9d92efb12154

0911.tgz

dd2599fc1de

3
Recommended System Configuration for Hosting a CTPView Server
The following are the recommended hardware configuration to setup a CTPView 9.1R5-1 server: · CentOS 7.5.1804 (64-bit) · 1x processor (4 cores) · 4 GB RAM · Number of NICs ­ 2 · 80 GB Disk space

CTPView Installation and Maintenance Policy
From the release of CTPView 9.0R1, Juniper Networks has adopted a policy for installation and maintenance of the CTPView server. CTPView is now being distributed as an "Application only" product, in the form of an RPM package. You can now install and maintain the OS (CentOS 7.5) according to the guidelines described in CTPView Network Management System Administration. This administration guide also has the complete installation procedure.

CVEs and Security Vulnerabilities Addressed in CTPView Release 9.1R5-1

The following tables list the CVEs and security vulnerabilities that have been addressed in CTPView 9.1R5-1. For more information about individual CVEs, see http://web.nvd.nist.gov/view/vuln/search.
Table 2: Critical or Important CVEs Included in bind

CVE-2023-3341

CVE-2023-4408

CVE-2023-50387

CVE-2023-50868

4

Table 3: Critical or Important CVEs Included in glibc

CVE-2024-2961

CVE-2024-33599 CVE-2024-33600 CVE-2024-33601 CVE-2024-33602

Table 4: Critical or Important CVEs Included in grub2 CVE-2022-2601

Table 5: Critical or Important CVEs Included in kernel

CVE-2023-3609

CVE-2023-32233

CVE-2023-35001

CVE-2023-42753

Table 6: Critical or Important CVEs Included in libssh2 CVE-2020-22218

Table 7: Critical or Important CVEs Included in linux-firmware

CVE-2020-12321

CVE-2023-20569

CVE-2023-20593

CVE-2023-20592

Table 8: Critical or Important CVEs Included in postgresql CVE-2023-5869

Table 9: Critical or Important CVEs Included in python CVE-2023-40217

Table 10: Critical or Important CVEs Included in openssh

CVE-2023-48795

CVE-2023-51384

CVE-2023-51385

CVE-2024-6387

Table 11: Critical or Important CVEs Included in httpd

CVE-2024-40725

CVE-2024-39884

CVE-2024-40898

5
Revision History
September 2024--Revision 1--CTPView Release 9.1R5-1.
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2024 Juniper Networks, Inc. All rights reserved.



References

AH XSL Formatter V6.6 MR1 for Windows (x64) : 6.6.2.35616 (2018/10/15 18:42JST) Antenna House PDF Output Library 6.6.1317 (Windows (x64))