mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-12 02:05:39 +00:00
Minor typo in 19.4R2-S7 affected/fixed release.
This commit is contained in:
parent
04a630c838
commit
7e40d64393
@ -37,7 +37,7 @@
|
||||
"platform": "QFX10K Series",
|
||||
"version_affected": "<",
|
||||
"version_name": "19.4",
|
||||
"version_value": "19.4R2-S, 19.4R3-S8"
|
||||
"version_value": "19.4R2-S7, 19.4R3-S8"
|
||||
},
|
||||
{
|
||||
"platform": "QFX10K Series",
|
||||
@ -98,7 +98,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS).\n\nThe issue is caused by malformed MLD packets looping on a multi-homed Ethernet Segment Identifier (ESI) when VXLAN is configured. These MLD packets received on a multi-homed ESI are sent to the peer, and then incorrectly forwarded out the same ESI, violating the split horizon rule.\nThis issue only affects QFX10K Series switches, including the QFX10002, QFX10008, and QFX10016. Other products and platforms are unaffected by this vulnerability.\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\nAll versions prior to 19.1R3-S9;\n19.2 versions prior to 19.2R1-S9, 19.2R3-S5;\n19.3 versions prior to 19.3R3-S6;\n19.4 versions prior to 19.4R2-S, 19.4R3-S8;\n20.1 versions prior to 20.1R3-S4;\n20.2 versions prior to 20.2R3-S4;\n20.3 versions prior to 20.3R3-S2;\n20.4 versions prior to 20.4R3-S2;\n21.1 versions prior to 21.1R3;\n21.2 versions prior to 21.2R2-S1, 21.2R3;\n21.3 versions prior to 21.3R2."
|
||||
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS).\n\nThe issue is caused by malformed MLD packets looping on a multi-homed Ethernet Segment Identifier (ESI) when VXLAN is configured. These MLD packets received on a multi-homed ESI are sent to the peer, and then incorrectly forwarded out the same ESI, violating the split horizon rule.\nThis issue only affects QFX10K Series switches, including the QFX10002, QFX10008, and QFX10016. Other products and platforms are unaffected by this vulnerability.\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\nAll versions prior to 19.1R3-S9;\n19.2 versions prior to 19.2R1-S9, 19.2R3-S5;\n19.3 versions prior to 19.3R3-S6;\n19.4 versions prior to 19.4R2-S7, 19.4R3-S8;\n20.1 versions prior to 20.1R3-S4;\n20.2 versions prior to 20.2R3-S4;\n20.3 versions prior to 20.3R3-S2;\n20.4 versions prior to 20.4R3-S2;\n21.1 versions prior to 21.1R3;\n21.2 versions prior to 21.2R2-S1, 21.2R3;\n21.3 versions prior to 21.3R2."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -159,7 +159,7 @@
|
||||
"solution": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The following software releases have been updated to resolve this specific issue: Junos OS 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S2, 20.4R3-S2, 21.1R3, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases."
|
||||
"value": "The following software releases have been updated to resolve this specific issue: Junos OS 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S2, 20.4R3-S2, 21.1R3, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases."
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
@ -175,4 +175,4 @@
|
||||
"value": "There are no viable workarounds for this issue.\nService may be temporarily restored by disabling/enabling the IRB interface affected by this issue. Note that this will cause a temporary service interruption as the interface is flapped."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user