Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

12.3R12-S15: Software Release Notification for JUNOS Software Version 12.3R12-S15

0

0

Article ID: TSB17728 TECHNICAL_BULLETINS Last Updated: 25 Jun 2020Version: 2.0
Alert Type:
SRN - Software Release Notification
Product Affected:
EX
Alert Description:
Junos Software Service Release version 12.3R12-S15 is now available for download from the Junos software download site
Download Junos Software Service Release:
  1. Go to Junos Platforms - Download Software page
  2. Input your product in the "Find a Product" search box
  3. From the Type/OS drop-down menu, select Junos SR
  4. From the Version drop-down menu, select your version
  5. Click the Software tab
  6. Select the Install Package as need and follow the prompts
Solution:
Junos Software service Release version 12.3R12-S15 is now available.

12.3R12-S15 - List of Fixed issues

PR Number Synopsis Category: ESWD
1459325 The ERPS does not run on the new master after GRES switchover
 
On EX2200/EX3200/EX3300/EX4200/EX45XX/EX6200/EX82XX platforms with VC setup, the ERPS does not run on the new master after GRES switchover.
PR Number Synopsis Category: Marvell based EX PFE ANALYZER
1073974 The pfem core have seen when executing PFE commands "show halp-analyzer input ingress interface dev 0"
 
The pfem core have seen when executing PFE commands "show halp-analyzer input ingress interface dev 0"
PR Number Synopsis Category: Marvell based EX PFE L3
1209585 Some PIM groups are not able to send out native multicast traffic
 
On EX8200 Series switches that act as a designated router, if the source multicast interface is a VLAN and contains 2*10G active links aggregated interface as VLAN member, then some PIM groups are not able to send out native multicast traffic because of incorrect programming of the Packet Forwarding Engine.
PR Number Synopsis Category: Border Gateway Protocol
1157842 Maximum-prefixes check is not being done for rib-copied BGP received routes
 
When rib-group copy is done for a route change, the rib-group copy of the secondary route into the destination tables of the copy may not honor maximum-prefixes in some scenarios, such as upon damping changes. The traffic forwarding might be affected.
PR Number Synopsis Category: JUNOS Dynamic Profile Configuration Infrastructure
1041828 Possible memory leak in sdb
 
running a pppoe scaling test with 8k subs constantly do login / logout the SDB located in /mfs is increasing but never freeing even after logout of all subscribers.
PR Number Synopsis Category: EX Chassis chassism/chassisd
1469790 show interface < interface> media command shows the media type for the SFP-T to be fiber
 
EX4500 might incorrectly show the media type of an SFP-T copper module as fiber in the output of the 'show interface' command.
PR Number Synopsis Category: EX Chassis Interface Handling
1423083 EX switches might cause potential filesystem corruption and panics
 
On EX switch running with FreeBSD 6.x, and in some rare cases, there are some errors on storage media, failures might happen if soft update threads write info on the storage, and this failure will cause the device can not be shut down successfully, which finally leads to panics and filesystem corruption.
PR Number Synopsis Category: ISIS routing protocol
1100756 ISIS failing to purge doppelganger LSP due to bug in handling self-originated LSPs
 
Due to software bug Junos cannot purge so called doppelganger LSP, if such LSP is received over newly formed adjacency shortly after receiving CSNP from the same neighbor.
PR Number Synopsis Category: Security platform jweb support
1410401 Junos OS: Session fixation vulnerability in J-Web (CVE-2019-0062)
 
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. Please refer to https://kb.juniper.net/JSA10961 for more information.
PR Number Synopsis Category: Multiprotocol Label Switching
1145627 During FRR, juniper MP does not send label sub-object in RRO for the backup LSPs...
 
This issue is related to RSVP-TE FRR (RFC 4090) interoperability between Juniper Networks and Cisco devices. If Juniper Networks is the PLR (point-of-local-repair), then it does not set the "label recording desired" flag in the backup path messages. Also, Juniper as the merge point (MP) does not send the label sub-object in the RESV RRO for the backup LSPs. However, the Cisco PLR sends the backup path message with the "label recording desired" flag set and expects to see the label sub-object in the corresponding RESV RRO. So as a result, in the scenario where the Cisco device is the PLR and the Juniper device is the MP, a change in the RESV label while protection is in use at the PLR will not get propagated upstream beyond the MP.
PR Number Synopsis Category: Junos Automation, Commit/Op/Event and SLAX
843062 The cscript core is generated during pressure test
 
The cscript core is generated during pressure test of ServiceNow
PR Number Synopsis Category: DDL/ODL infrastructure and CLI/Op commands
1297728 The mgd process might consume high RE CPU when certain show commands are executed
 
On running certain commands that involve command-forwarding, a MGD process is created to retrieve the data. In rare cases, if this command times out or if it is manually terminated (for example, using Ctrl+C), then it can lead to MGD to utilize high Routing Engine CPU.
 
 

12.3R12-S15 - List of Open issues

PR Number Synopsis Category: EX4300 PFE
1343402 JSA10983 Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets (CVE-2020-1604)
 
On EX4300, EX4600, QFX3500, and QFX5100 Series, a vulnerability in the IP firewall filter component may cause the firewall filter evaluation of certain packets to fail. Refer to https://kb.juniper.net/JSA10983 for more information.
PR Number Synopsis Category: QFX Access control list
1026708 EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets (CVE-2020-1604)
 
On EX4300, EX4600, QFX3500, and QFX5100 Series, a vulnerability in the IP firewall filter component may cause the firewall filter evaluation of certain packets to fail. Refer to https://kb.juniper.net/JSA10983 for more information.
1458027 Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets (CVE-2020-1604)
 
On EX4300, EX4600, QFX3500, and QFX5100 Series, a vulnerability in the IP firewall filter component may cause the firewall filter evaluation of certain packets to fail. Refer to https://kb.juniper.net/JSA10983 for more information.
PR Number Synopsis Category: BBE network stack related issues
1432957 Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service
 
Receipt of a specific MPLS or IPv6 packet on the core facing interface of an MX Series device configured for Broadband Edge (BBE) service may trigger a kernel crash (vmcore), causing the device to reboot. Please refer to https://kb.juniper.net/JSA10987 for more details.
PR Number Synopsis Category: Border Gateway Protocol
1309982 Junos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the routing protocol daemon (rpd) process to core (CVE-2019-0066)
 
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP.
PR Number Synopsis Category: mgd, ddl, odl infra issues
1406219 Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation (CVE-2019-0061)
 
The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges.
PR Number Synopsis Category: jdhcpd daemon
1449353 Junos OS and Junos OS Evolved: Multiple vulnerabilities in JDHCPD allow for OS command injection and code execution of JDHCPD
 
A device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process configured relay mode is vulnerable to multiple vulnerabilities which allow an attacker to send crafted packets who may arbitrarily execute commands as root on the target device, or who may take over the code execution of the JDHDCP process. Refer to https://kb.juniper.net/JSA10981 for more information.
PR Number Synopsis Category: Multiprotocol Label Switching
1402185 JSA10979 Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon. (CVE-2020-1600)
 
In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of Service (DoS) condition. Refer to https://kb.juniper.net/JSA10979 for more information.
PR Number Synopsis Category: FreeBSD Kernel Infrastructure
1439189 The recovery snapshot cannot be created after system zeroize
 
On EX2300/3400 platforms, the recovery snapshot might not be able to be created after a system zeroize. This is due to certain hardware space limitation over time where there is not enough space to save full snapshot.
PR Number Synopsis Category: IPv6/ND/ICMPv6 issues
1443576 Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device. (CVE-2020-1603)
 
Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled. Refer to https://kb.juniper.net/JSA10982 for more information.
PR Number Synopsis Category: Path computation client daemon
1395205 Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash. [CVE-2020-1601]
 
Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Element (PCE) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker to cause the pccd process to crash and generate a core file thereby causing a Denial of Service (DoS). Refer to https://kb.juniper.net/JSA10980 for more information.
PR Number Synopsis Category: Virtual Private Networks - rpd
1356763 Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host. (CVE-2019-0059)
 
A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device.
Modification History:
Update to include "known open" issue date 2020-06-25
First publication date 2020-02-20
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search