Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

17.2R2-S6: Software Release Notification for Junos Software Service Release version 17.2R2-S6

0

0

Article ID: TSB17447 TECHNICAL_BULLETINS Last Updated: 11 Oct 2018Version: 1.0
Alert Type:
SRN - Software Release Notification
Product Affected:
ACX, ACX5k, EX, MX, PTX 1K / 3K / 5K /10K, QFX5100/5110/5200/10K, VMX, VRR, Network Agent
Alert Description:
Junos Software Service Release version is now available for download from the Junos software download site
Download Junos Software Service Release:
  1. Go to Junos Platforms - Download Software page
  2. Input your product in the "Find a Product" search box
  3. From the Type/OS drop-down menu, select Junos SR
  4. From the Version drop-down menu, select your version
  5. Click the Software tab
  6. Select the Install Package as need and follow the prompts
Solution:

Junos Software service Release version 17.2R2-S6 is now available.

The following are incremental changes in 17.2R2-S6.

 
PR Number Synopsis Description
1300333 BGP might send incorrect AS path when alias is enabled and multiple peers are under the BGP group. When "local-as x" and "alias" are configured under a BGP group that has multiple BGP peers, the BGP might send an AS path to the peer that includes an incorrect AS number. This causes the BGP session to flap.
1316192 The FAN speed might frequently keep changing between normal and full for MX platform On MX platform with MPC cards, frequent FAN speed change might be seen.
1322891 Dot1xd core might be observed if configuring dot1x interface with EAP-PEAP as an authentication protocol On EX4300 platform, dot1xd core might be observed if configuring dot1x interface with EAP-PEAP as an authentication protocol.
1324531 The memory leakage seen in mosquitto-nossl daemon In Message Queue Telemetry Transport (MQTT) scenario, the memory leakage (about 4k memory leakage every 30 seconds) might be seen. However, on very long runs, this uses up high memory which can indirectly impact other daemons running.
1331234 Junos OS: Denial of service in telnetd (CVE-2018-0061) Junos OS: Denial of service in telnetd (CVE-2018-0061); Refer to https://kb.juniper.net/JSA10896 for more information.
1332483 The last IFL digit is sometimes truncated in jpppd trace logs In a subscriber-management environment trace logs for jpppd process (configurable in ppp-service stanza) may miss the last digit of the interface name.
1338688 MX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interfaces (CVE-2018-0056) MX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interfaces (CVE-2018-0056); Refer to https://kb.juniper.net/JSA10890 for more information.
1343597 QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames (CVE-2018-0054) QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames (CVE-2018-0054); Refer to https://kb.juniper.net/JSA10888 for more information.
1344177 Junos OS: Memory exhaustion denial of service vulnerability in Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support (CVE-2018-0048) Junos OS: Memory exhaustion denial of service vulnerability in Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support (CVE-2018-0048); Refer to https://kb.juniper.net/JSA10882 for more information.
1351334 Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address) (CVE-2018-0057) Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address) (CVE-2018-0057); Refer to https://kb.juniper.net/JSA10892 for more information.
1355542 Commit error observed if box is downgraded from from 18.2/18.3 release to 17.3R3 Commit error observed if box is downgraded from from 18.2/18.3 release to 17.3R3 On loading the new image, certain stale symlinks from previous image contents need to be removed which impact mgd. In this case, the .slax script symlinks from /var/db/sripts/translation are not getting removed, which causes issues in the initial commit by mgd The issue is only seen when the previous image was having translation scripts (as part of Junos image) and the new image isn't have these translation scripts
1365740 Root password recovery process doesn't work On QFX5110/QFX5200/QFX10000 platforms, the JUNOS Boot menu cannot appear due to 'CTRL+C' does not give the menu during the boot process. Root password recovery option might not available.
1368377 Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message (CVE-2018-0055) Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message (CVE-2018-0055); Refer to https://kb.juniper.net/JSA10889 for more information.
1368599 MX Series: In BBE configurations receipt of a crafted IPv6 exception packet causes a Denial of Service (CVE-2018-0058) MX Series: In BBE configurations receipt of a crafted IPv6 exception packet causes a Denial of Service (CVE-2018-0058); Refer to https://kb.juniper.net/JSA10893 for more information.
1368986 Commit may fail in single-user mode If the device is booted into single-user mode (recovery mode), and any change in configuration is made, such as setting the root password, then commit will fail.
1370610 MLPPP subscribers might be unable to negotiate sessions when the dynamic-profile name contains more than 30 characters On MX platform which supports dynamic Multi-link Point-to-Point (MLPPP) subscriber, if the dynamic-profile name contains more than 30 characters, MLPPP subscribers might be unable to negotiate sessions with the server, and couldn't login due to this issue.
1380862 Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash (CVE-2018-0049) Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash (CVE-2018-0049); Refer to https://kb.juniper.net/JSA10883 for more information.
Modification History:
First publication date - 2018-10-11
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search