Knowledge Search


×
 

18.4R1-S2: Software Release Notification for Junos Software Service Release version 18.4R1-S2

  [TSB17559] Show Article Properties


Alert Type:
SRN - Software Release Notification
Product Affected:
ACX, EX, MX, PTX, QFX, NFX, SRX, VRR, and VMX
Alert Description:
Junos Software Service Release version is now available for download from the Junos software download site
Download Junos Software Service Release:
  1. Go to Junos Platforms - Download Software page
  2. Input your product in the "Find a Product" search box
  3. From the Type/OS drop-down menu, select Junos SR
  4. From the Version drop-down menu, select your version
  5. Click the Software tab
  6. Select the Install Package as need and follow the prompts
Solution:

Junos Software service Release version 18.4R1-S2 is now available.

PRs found and not fixed in 18.4R1-S2

PR Number Synopsis Description
1442376 EX2300 platforms with some specific releases might stop forwarding traffic or responding to console On EX2300/EX2300-C/EX2300-MP platforms, if Junos software is with FreeBSD kernel version 11 with the build date on or after 2019-02-12, the switch may stop forwarding traffic or responding to console. A reboot is required to restore the service.
     

 

The following are incremental changes in 18.4R1-S2.

 
PR Number Synopsis Description
1346452

Error message "STUCK_BUFF : port_sp not empty for port 35 sp 1 pkts:1"

Ingress buffers are stuck in MMU during system init. During system init we are seeing very huge amount of packets getting copied to CPU causing ddos violations and rate limiting on CPU queues. At this point of time,some default IFD COS settings are getting programmed. Before doing COS setting we are trying to drain all the packets from MMU, If not we are going ahead and doing HW programming. This is causing the stuck buffer issue. packets destined to CPU can't be drained using SDK call, we are increasing the loop wait time to 10sec.

1366459

When IKE policy proposals encryption-type algorithm begin with aes-gcm, then IPsec proposal cannot be configured with cbc

When aes-gcm is configured in an IKE proposal, then commit check enforces the IPsec proposal to use aes-gcm.

1377749

In EVPN A-A scenario with MX or EX acting as PE device,flood NHs to handle BUM traffic may not get created or miss certain branches when the configuration is performed in a particular sequence

In EVPN A-A scenario with MX or EX acting as PE device,flood NHs to handle BUM traffic may not get created or miss certain branches when the configuration is performed in a particular sequence

1384929

A RSVP-signaled LSP might stay in down state after a link in the path flaps

In RSVP (Resource Reservation Protocol) LSP (Label Switched Path) with loose or undefined path scenario, the LSP might stay in down state due to loop detection after the link in the path flaps.

1389518

ACX 5448:100G Link FEC enabled by default on 100G LR4

Default FEC on 100G LR4 was FEC91, now it is set up NONE

1393940

The FPC cards might not come up while performing ISSU on MX10003

On MX10003 with 18.2R1 or above, the FPC cards might not come up while performing ISSU.

1394922

Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored (CVE-2019-0036)

Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored (CVE-2019-0036); Refer to https://kb.juniper.net/JSA10925 for more information.

1397018

The rpd process might keep crashing repeatedly if the LSP destination address is set to be 0.0.0.0

On all Junos platforms, if the Label Switched Path (LSP) destination address is set to be 0.0.0.0 under the protocol Multiprotocol Label Switching (MPLS), the rpd process might keep crashing repeatedly and won't recover due to this issue.

1399141

Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019)

Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019); Refer to https://kb.juniper.net/JSA10931 for more information.

1399733

QFX5100 - VXLAN - Traffic is queued in the wrong queue when interface configuration is changed from a layer 2 with VXLAN configured on the VLAN to a family inet configuration

On QFX5100, traffic initiated from a server connected to an interface will be dropped at the interface on the switch if the interface was configured with family ethernet-switching with VXLAN and the configuration is changed to family inet.

1404002

The time synchronization through PTPoE might not work when Enhanced Subscriber Management is enabled on MX

When Enhanced Subscriber Management is enabled on MX (i.e. set system services subscriber-management enable), the Precision Time Protocol (PTP) with PTP-over-Ethernet (PTPoE) configuration might not work on MPC2E-NG/3E-NG or MPC5E and above (such as MPC6E/7E/8E/9E/10E/11E).

1404756

The SFP-T ports on the NFX/EX2300 platform might not become active

An SFP-T interface will not become active when SFP-T is plugged. It has a traffic impact.

1405798

ACX 5448: TrTCM Policer configuration parameters are as per RFC4115.

ACX5448 hardware supports TrTCM of RFC4115. While the RFC4115 & hardware deals with CIR/CBS & EIR/EBS, JunOS CLI does have CIR/CBS & PIR/PBS only. So, PFE will calculate internally EIR=PIR-CIR and configure the hardware. And the PBS value is configured as EBS in the hardware. ACX5448 supports minimum of 22Kbps policer rate, so EIR (PIR-CIR) should be minimum 22kbps.

1406029

HA failed with the failure code HW after loading the image.

If user has SPC3 and SPC2 in a HA system, and see all PICs online on ?show chassis fpc pic-status? but see HA status stuck at ?HW? under Monitor-failures column, check if HA port is configured to SPC3 card, if so, re-configure the HA port to SPC2 card, then reboot the system. If there are only SPC3 cards in the HA system, set hidden CLI ?set chassis cluster no-hardware-monitoring? to prevent this issue. This a software issue and will be fixed in 18.4R1-S1.

1406219

Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation (CVE-2019-0061)

The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges.

1409847

Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053)

In Junos OS, insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053); Refer to https://kb.juniper.net/JSA10947 for more information.

1410400

Junos OS: Persistent XSS vulnerability in J-Web (CVE-2019-0047)

A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web.

1410970

Packets might be dropped if the traffic forward via an LT interface

On all Junos platform, if the traffic forward to IRB via an LT (Logical Tunnel) interface, packets might be dropped.

1410981

On SRX Series devices, when using Unified Policies and Web filtering (EWF) without SSL proxy, the Server Name Indication (SNI) might not be identified correctly and the RT_UTM logs were recording incomplete information.

On SRX Series, when using Unified Policies and Webfiltering (EWF) without SSL-Proxy, the Server Name Indication (SNI) may not be identified correctly and the RT_UTM logs were recording incomplete information.

1411858

Traffic loss might be observed after VXLAN configuration change

On EX4300/EX4600/QFX5100/QFX5200 platforms, when IRB is configured in VXLAN environment, traffic loss might happen after making configuration change. For example, it is observed that after VNI-id is changed, the EBGP session over the IRB goes down and does not come back up due to the ARP resolution failure.

1414467

On SRX1500, SRX4100, SRX4200, SRX4600, and SRX5000 line of devices with SPC3 card, if SSL proxy is configured, the firewall FPC CPU might spike above 80 percent and traffic might be lost.

On SRX1500, SRX4100, SRX4200, SRX4600, or SRX5K with SPC III card, if SSL proxy is configured, the firewall FPC CPU might spike above 80% and traffic might be lost.

1414532

Anomaly in LED behavior after rebooting the directly connected device.

Anomaly in LED behavior ; LED turns orange and not functioning after the reboot of directly connected router.

1414688

Some Junos releases could not be installed successfully on EX2300-C platform

Due to a problem with the install process, following Junos releases for the EX2300-C platform could not be installed successfully: 18.1R3-S3 18.2R2-S1 18.2R2-S2 18.4R1 18.4R1-S1 These releases have been removed from the download page and will not be replaced. This problem affects only the EX2300-C platform. Previous and subsequent releases are not affected.

1415224

PCE initiated LSPs get deleted because of wrong timer timeout

PCE initiated LSPs get deleted from PCC if PCEP session goes down and gets re-established within "delegation-cleanup-timeout" period

1415352

The reth interfaces are now supported when configuring SSL decryption mirroring (mirror-decrypt-traffic interface).

Reth interfaces are now supported when configuring SSL Decryption Mirroring (mirror-decrypt-traffic interface)

1415614

The L2circuit egress PE might drop the traffic in FAT+CW enabled L2circuit scenario when another FAT+CW enabled L2circuit PW flaps

On PTX1000/PTX10002/PTX10008/PTX10016 platforms, when multiple FAT+CW (FAT->flow-aware transport, CW->control-word) are enabled in L2circuit PWs (pseduo-wires) scenario, the L2circuit egress PE might drop the traffic (the affected PW is unsure/unkown) and also corrupt the PW traffic/packet received from MPLS core when another FAT+CW enabled L2circuit PW flaps (such as, link down, FPC crashes, do enable/disable of flow label on PW, etc).

1415898

The swap memory is not initialized on boot on ACX5048/5096

On ACX5048/5096 platforms, the swap memory is not initialized by default on boot. If SRAM is completely filled, then some inactive pages will be swapped to the swap memory. If the swap memory is not enabled then the new process might fail to start.

1416106

NFX-2: request-load-configuration output from device does not match with 18.4 yang

Please check with Dev engineer.

1416243

The rpd might crash in rosen MVPN scenario when a same provider tunnel source address is being used for both IPv4 and IPv6

In rosen MVPN scenario, if a same provider tunnel source address is being used for both IPv4 and IPv6 of the same routing instance, after deleting one of the tunnel source, the rpd might crash, all route states will be reinitiated during the crash.

1418937

lsp-cleanup-timer is not being honored when lsp-cleanup-timer is configured to be greater than 2147483647

The lsp-cleanup-timer, configured under [edit protocols pcep pce ] currently accepts values between 1 and 4294967294; however, only values between 1 and 2147483647 are valid for this configuration statement. If a value larger than 2147483647 is configured then when the path-computation-client status goes down the LSP is removed from the router immediately. Similarly if the LSP is PCE initiated and lsp-cleanup-timer is configured with a value above 2147483647 then the LSP will be removed immediately after the dead-timer expiry.

1418955

Junos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to Down, causes traffic to stop forwarding through the device.

This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device's Open Shortest Path First (OSPF) states to transition to Down, resulting in a Denial of Service (DoS) attack.

1419533

Junos OS: OpenSSL Security Advisory [26 Feb 2019]

The OpenSSL project has published a security advisory for a vulnerability resolved in the OpenSSL library on February 28, 2019. Refer to https://kb.juniper.net/JSA10949 for more information.

1419756

bbe-mibd memory leak causing daemon crash when having live subscribers and SNMP OIDs query

When having subscribers online and doing SNMP query for some of the OIDS such as ifXEntry, bbe-mibd daemon might experience memory leak and crash eventually.

1421539

failed to reload keyadmin database for /var/etc/keyadmin.conf

During commit of the configuration change the following warning message can appear: warning: Command exited: PID 7527, status 255, command keyadmin error: failed to reload keyadmin database for /var/etc/keyadmin.conf

Modification History:
Updated on 2019-10-29 to include PR1442376 in the Know Issue section
First publication date 2019-04-20
Related Links: