

On all Junos PTX Series and QFX10000 Series, when specific EVPN VXLAN Multicast packets are processed, an FPC heap memory leak is observed. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7 19.4 versions prior to 19.4R2-S8, 19.4R3-S10 20.2 versions prior to 20.2R3-S6 20.3 versions prior to 20.3R3-S5 20.4 versions prior to 20.4R3-S5 21.1 versions prior to 21.1R3-S4 21.2 versions prior to 21.2R3 21.3 versions prior to 21.3R3 21.4 versions prior to 21.4R2.Ī Missing Release of Memory after Effective Lifetime vulnerability in Flexible PIC Concentrator (FPC) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker from the same shared physical or logical network, to cause a heap memory leak and leading to FPC crash. Eventually the flowd process will crash and restart. In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function.Ī Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). Users unable to upgrade should not feed untrusted user data to the decoding functions. Users are advised to upgrade to version 0.4.3 to resolve this issue. This is caused by bogus `fanout` parameter in the HAMT directory nodes. If you are reading untrusted user input, an attacker can then trigger a panic. Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. Go-unixfs is an implementation of a unix-like filesystem on top of an ipld merkledag. There are no known workarounds for this vulnerability. This is caused by bogus fanout parameter in the HAMT directory nodes.

In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing.
