ADVANCED CONSOLE SERVER CS FAMILY RELEASES


This document outlines the new features and bug fixes for Advanced Console Server CS family of products (including BETA releases that are designated by a letter after the version number).


V_2.6.0  Dec/08/2005 :  (official release; upgrade from V_2.3.0-3)

a) New features b) Bug fixes
c) Known Bugs

d) Change Log

e) Warning


V_2.3.0-3  Sep/16/05 :  (official release; upgrade from V_2.3.0-2)

a) Bug fixes


V_2.3.0-2  Mar/09/05 :  (official release; upgrade from V_2.3.0-1)

a) Bug fixes
c) Known Bugs


V_2.3.0-1  Dec/16/04 :  (official release; upgrade from V_2.3.0)

a) Bug fixes


V_2.3.0  Dec/13/04 :  (official release; upgrade from V_2.2.0-3)

a) New features

b) Bug fixes c) Known Bugs
d) Change Log

V_2.2.0-3  Aug/13/04 :  (official release; upgrade from V_2.2.0-1)

a) Bug fixes

V_2.2.0-1  Jun/11/04 :  (official release; upgrade from V_2.2.0)

a) Bug fixes

V_2.2.0  May/28/04 :  (official release; upgrade from V_2.1.6)

a) New features

b) Bug fixes c) Change Log
# CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
drivers do not pad frames with null bytes, which allows remote attackers
to obtain information from previous packets or kernel memory by using
malformed packets

# CAN-2003-0127: The kernel module loader allows local users to gain root
privileges by using ptrace to attach to a child process that is spawned by
the kernel

# CAN-2003-0244: The route cache implementation in Linux 2.4, and the
Netfilter IP conntrack module, allows remote attackers to cause a denial
of service (CPU consumption) via packets with forged source addresses that
cause a large number of hash table collisions related to the PREROUTING
chain

# CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
allows attackers to cause a denial of service ("kernel oops")

# CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
kernel 2.4 allows remote attackers to cause a denial of service (CPU
consumption) via certain packets that cause a large number of hash table
collisions

# CAN-2003-0018 Linux kernel 2.4.10 through 2.4.21-pre4 does not properly
handle the O_DIRECT feature, which allows local attackers with write
privileges to read portions of previously deleted files, or cause file
system corruption.

# CAN-2002-0499 The d_path function in Linux kernel 2.2.20 and earlier,
and 2.4.18 and earlier, truncates long pathnames without generating an
error, which could allow local users to force programs to perform
inappropriate operations on the wrong directories.

# CAN-2003-0619 Integer signedness error in the decode_fh function of
nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a
denial of service (kernel panic) via a negative size value within XDR data
of an NFSv3 procedure call.

# CAN-2003-0462: Paul Starzetz discovered a file read race condition
existing in the execve() system call, which could cause a local crash.

# CAN-2003-0464: A recent change in the RPC code set the reuse flag on
newly created sockets. Olaf Kirch noticed that his could allow normal
users to bind to UDP ports used for services such as nfsd.

# CAN-2003-0476: The execve system call in Linux 2.4.x records the file
descriptor of the executable process in the file table of the calling
process, allowing local users to gain read access to restricted file
descriptors.

# CAN-2003-0501: The /proc filesystem in Linux allows local users to
obtain sensitive information by opening various entries in /proc/self
before executing a setuid program. This causes the program to fail to
change the ownership and permissions of already opened entries.

# CAN-2004-0077: The do_mremap function for the mremap in Linux 2.2 to
2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the
return value from the do_munmap function when the maximum number of VMA
descriptors is exceeded, which allows local users to gain root privileges,
a different vulnerability than CAN-2003-0985.

# CAN-2003-0985: The mremap system call (do_mremap) in Linux kernel 2.4
and 2.6 does not properly perform bounds checks, which allows local users
to cause a denial of service and possibly gain privileges by causing a
remapping of a virtual memory area (VMA) to create a zero length VMA, a
different vulnerability than CAN-2004-0077.


V_2.1.6  Feb/09/04 :  (official release; upgrade from V_2.1.5.1)

a) New features

b) Bug fixes c) Known Bugs
d) Change Log
This OpenSSH version uses these following authentication methods when the parameter UsePAM is configured as "yes":
          - TIS or CryptoCard authentication in SSH-1
          - "keyboard-interactive" authentication in SSH-2.

Please,  pay attention in ssh client configuration  to accept these authentication methods.

V_2.1.5.1  Dec/09/03 :  (official release; upgrade from V_2.1.5)

a) New features

b) Bug fixes c) Change Log

V_2.1.5  Oct/15/03 :  (official release; upgrade from V_2.1.4.1)

a) New features

b) Bug fixes c) Change Log
PM versions after that have prompt "pm>"

/etc/pm.bb defines the prompt as "pm8>" for all CS versions before V_2.1.3. It defines as "pm>" for V_2.1.4 and later



V_2.1.4.1 Sep/18/03:  (official release; upgrade from V_2.1.4)

a) New features

b) Bug fixes c) Change Log

V_2.1.4  Aug/11/03:  (official release; upgrade from V_2.1.3)

a) New features

b) Bug fixes c) Change Log

V_2.1.3  Jun/30/03:  (official release; upgrade from V_2.1.2)

a) New features

b) Bug fixes c) Change Log

V_2.1.2  Mar/21/03:  (official release; upgrade from V_2.1.1)

a) New features

b) Bug fixes
  • Telnet/SSH connections with Data Buffering are locked after NFS server goes down
  • Protocol socket_server ignores the [more] data buffer menu command over telnet
  • Wizard for DB is setting the parameter *.data_buffering wrongly when the value has more than 5 digits
  • PPP connection from a Windows 2000 would not be established unless cb_script line was commented out in pslave.conf
  • c) Change Log             New directory/files:
                - pmd/
                - pmd/*
    The text of the first message showed when root does the first
    login, is wrong:
    /etc/init.d/pmd

    V_2.1.1  Jan/10/03:  (official release; upgrade from V_2.1.0)

    a) New features

    b) Bug fixes c) Change Log

    V_2.1.0  Nov/01/02:  (official release; first release)

    a) New features

    b) Bug fixes