Knowledge Search


×
 

12.3R12-S13: Software Release Notification for Junos Software Service Release version 12.3R12-S13

  [TSB17583] Show Article Properties


Alert Type:
SRN - Software Release Notification
Product Affected:
EX
Alert Description:
Junos Software Service Release version is now available for download from the Junos software download site
Download Junos Software Service Release:
  1. Go to Junos Platforms - Download Software page
  2. Input your product in the "Find a Product" search box
  3. From the Type/OS drop-down menu, select Junos SR
  4. From the Version drop-down menu, select your version
  5. Click the Software tab
  6. Select the Install Package as need and follow the prompts
Solution:

Junos Software service Release version 12.3R12-S13 is now available.

Serious PRs found and not fixed in 12.3R12-S13

PR Number Synopsis Description
1445380 RADIUS/TACACS remote authentication does not work on 12.3R12-S13 After an EX switch is upgraded to Junos software version 12.3R12-S13, RADIUS or TACACS remote authentication may not work.
     

 

The following are incremental changes in 12.3R12-S13.

 
PR Number Synopsis Description
1208815

2019-07 Security Bulletin: Junos OS: Multiple Vulnerabilities in OpenSSH

Multiple vulnerabilities have been resolved in Junos OS by updating third party software included with Junos OS or by fixing vulnerabilities found during internal testing. For further information refer to JSA10940.

1233050

The PFE process might crash in scenario with large log messages on EX switch

On EX Series switches except EX4300/EX4600/EX9200, when RTG (Redundant Trunk Group) switchovers are done, then the /var/log/shadow.log or /var/log/shadow_debug.log is rotated. And it might cause PFE process to crash.

1401915

802.1x authentication issue might be seen on Legacy EX platforms in mac-radius multi-supplicant mode

On Legacy EX platforms (EX2200/EX3200/EX3300/EX4200/EX45/EX62/EX82) with RE protect filter configured (firewall filter applied on loopback interface), when an interface is using 802.1x mac-radius multi-supplicant mode and there are more than one devices daisy-chained on the interface, MAC learning messages for unknown source might be dropped, which will cause 802.1x legitimate users fail to be authenticated.

1406296

The ERPS ring may fail and traffic may lose on EX

On the EX-series switch with ERPS configured scenario, if one of the ERPS (Ethernet Ring Protection Switching) interfaces is deleted by unplugging transceiver, eswd (ethernet switching process) crash and ERPS PDUs won't be sent anymore. This issue may cause the ERPS ring failure and traffic loss.

1408717

The dot1x authentication might fail to be authenticated on some EX platforms

On EX2200/EX3200/EX3300/EX4200/EX4500/EX4550/EX6200/EX8200/EX8208/EX8016 Series platforms, the dot1x authentication might fail to be authenticated because the EX device doesn't strip the VLAN tag/priority for the tagged EAP responses packets.

1409847

Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053)

In Junos OS, insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053); Refer to https://kb.juniper.net/JSA10947 for more information.

1418036

MAC address might be learned as persistent on the trunk interface

MAC address might be learned as persistent on trunk interface when configured with both trunk interface and "ethernet-switching-options secure-access-port interface all persistent-learning" on EX2200/EX3200/EX3300/EX4200/EX4500/EX4550/EX6200/EX8200 platforms. The reason for this issue is the validation for the trunk port always fail during interface "all" configuration parsing.

Modification History:
First publication 2019-05-31
Updated to include PR1445380 2019-09-03
Related Links: