This issue does not affect Juniper Networks Junos OS Evolved versions earlier than 21.4R1-EVO.Ī null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue affects Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L: * 21.4-EVO versions earlier than 21.4R3-S6-EVO * 22.1-EVO versions earlier than 22.1R3-S5-EVO * 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO * 22.3-EVO versions earlier than 22.3R2-EVO. This issue does not happen with IPv6 packets. Continued receipt of such packets will lead to a sustained DoS. If a specific IPv4 UDP packet is received and sent to the Routing Engine (RE) packetio crashes and restarts which causes a momentary traffic interruption. A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |