39
Condition: None.
201507070217
Symptom: ACL mismatches occur if a connection limit policy is applied to DS-Lite tunnels.
Condition: This symptom might occur if a connection limit policy is applied to DS-Lite tunnels.
201510200471
Symptom: The routing, multicast, authentication, and voice modules stop working, and
incorrect information is displayed for the TRAP, NetStream, and DHCP modules.
Condition: This symptom might occur if the router has been running for more than seven
months (214 days).
201508260173
Symptom: The time range status is incorrect if NTP is used.
Condition: This symptom might occur if NTP is used.
201510140128
Symptom: DDNS dynamic domain name update fails if the DDNS password contains forward
slashes (/).
Condition: This symptom might occur if the DDNS password contains forward slashes (/).
201509160563
Symptom: The router reboots unexpectedly if the router acts as a PPPoE server and PPPoE
users repeatedly come online and go offline.
Condition: This symptom might occur if the router acts as a PPPoE server and PPPoE users
repeatedly come online and go offline.
201401100267
Symptom: PPP IPCP negotiation fails when a PPPoE client initiates a connection request to the
router, and the VA interface goes up and comes down constantly.
Condition: This symptom might occur if NAT is performed for the PPPoE client, and IP address
negotiation is enabled on the dialer interface.
201509170256
Symptom: Information about the last login is not displayed for a user that passes authentication.
Condition: None.
201507160359
Symptom: CVE-2014-8176
Condition: If a DTLS peer receives application data between the ChangeCipherSpec and
Finished messages. May result in a segmentation fault or potentially, memory corruption.
Symptom:CVE-2015-1788
Condition: When processing an ECParameters structure OpenSSL enters an infinite loop. This
can be used to perform denial of service against any system which processes public keys,
certificate requests or certificates.
Symptom: CVE-2015-1789
Condition: X509_cmp_time does not properly check the length of the ASN1_TIME string and/or
accepts an arbitrary number of fractional seconds in the time string. An attacker can use this to
craft malformed certificates and CRLs of various sizes and potentially cause a segmentation
fault, resulting in a DoS on applications that verify certificates or CRLs.
Symptom: CVE-2015-1790