Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. This issue does not affect Juniper Networks Junos OS Evolved versions earlier than 21.4R1-EVO.Ī null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue affects Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L: * 21.4-EVO versions earlier than 21.4R3-S6-EVO * 22.1-EVO versions earlier than 22.1R3-S5-EVO * 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO * 22.3-EVO versions earlier than 22.3R2-EVO. This issue does not happen with IPv6 packets. Continued receipt of such packets will lead to a sustained DoS. If a specific IPv4 UDP packet is received and sent to the Routing Engine (RE) packetio crashes and restarts which causes a momentary traffic interruption. This issue affects Linux kernel: v2.6.12-rc2.Ī NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C. NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |