Release Notes CSG 7.2.42
Collax Security Gateway
13.05.2026
Installation Notes
Update Instructions
To install this update please follow the following steps:
Procedure
- It is highly recommended to backup of all server data with the Collax backup system before proceeding. Check that the backup was successful before proceeding with the update (this can be done within the backup information email).
- In the administration interface go to Menu → Software → System Update and press Get Package List. This will download the listed update packages. If successful the message Done! will be displayed on the screen.
- Click Get Packages to download the update packages.
- Click Install. This installs the update. The end of this process is indicated by the message Done!.
- A new kernel will now be installed. The system will reboot automatically after installing the update. An appropriate note will be shown if the update process is completed.
Issues fixed in this version
System Management: Linux Kernel 6.6.138
This update upgrades the Linux kernel to version 6.6.138.
The kernel update includes security fixes for several vulnerabilities, including “Fail Copy,” “DirtyFrag,” and “Copy Fail 2.”
Additionally, the “Pack2TheRoot” vulnerability is addressed. However, the necessary component “PackageKit” is not installed on Collax systems, so Collax systems are not affected by this.
Security: Apache 2.4.67
The Apache HTTP Server has been updated to version 2.4.67. The update addresses several security vulnerabilities and includes additional bug fixes.
The following CVEs, among others, are affected:
- important: Apache HTTP Server: http2: double free and possible RCE on early reset (CVE-2026-23918)
- moderate: Apache HTTP Server: mod_rewrite privilege escalation via ap_expr (CVE-2026-24072)
- low: Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header() (CVE-2026-28780)
- low: Apache HTTP Server: mod_md unrestricted OCSP response (CVE-2026-29168)
A complete list of security fixes and changes can be found in the official Apache Security Advisories:
https://httpd.apache.org/security/vulnerabilities_24.html
Notes
Additional software: Bitdefender - pattern update after commissioning
After starting up the Collax Antivirus powered by Bitdefender module, it may take a few minutes for the current virus patterns to be downloaded. If you click on Update Bitdefender in the virus scanner form during this time, you will receive an error message “Error connecting to server at /opt/lib/bitdefender//bdamsocket: -3”, because the background process has not yet been fully executed.
GUI: Sporadic hangs during running jobs
The progress of configuration jobs is displayed in the top right-hand corner of the web administration. In the case of extensive changes in the network area, especially with country locks (geo-ip), it can happen in rare cases that the job display hangs during activation. As of release 7.2.28, you will now receive the message “Network connection has been interrupted: Messages may be lost until the connection can be re-established.” informs you about such situations.
VPN: Fix for IKEv2 with Microsoft Windows crashes after 7.6 hours
VPN connections with IKEv2 and the on-board tools of Microsoft Windows are interrupted after interrupted after exactly 7.6 hours. The error occurs because Microsoft Windows proposes different algorithms during the IKE re-encryption than during the first connection. The problem can be solved with a registry fix by the value “NegotiateDH2048_AES256” under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters to 1 is set.
Under the following link you will find a REG file (registry entry) that adds the registry key. Collax accepts no liability for system errors resulting from this.