| |
Bug Id: | CSCsx35705 |
Title: | c2951 crashes @ AFW_Process_EventQueueOverloaded with BACD call |
|
Description: | Crash seen on a router running 15.2(4)M1 Router is configured with Voice/Tcl expression evaluation.
Current State: So far, this appears to be a corner case. Few instances where we saw this problem, crash happened only once. Problem could not be reproduced in a consistent manner.
If you are a Cisco customer and suspect running into this problem (frequently - more than once) and Cisco/TAC confirms that you are indeed running into this, please consider setting the router to write the core file and wait for the next occurrence.
4/25/2013 Another bug entirely related to this is CSCuf86086. To read about this, please visit tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCuf86086
NOTE: Only one customer has so far been affected by this bug. It is still in a state that it is not consistently reproducible.
If you are a Cisco customer and suspect running into this problem (frequently - more than once) and Cisco/TAC confirms that you are indeed running into this, please consider setting the router to write the core file and wait for the next occurrence.
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 05-MAY-2015 |
|
Known Affected Releases: | 12.4(23.5.2)PIX11 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCua05196 |
Title: | C2900 crashed at 'cvmx_fpa_shutdown_pool' function due to reload cmd |
|
Description: | Symptoms: After the reload command is entered, the router gets crashed.
Conditions: This symptom occurs when SSH traffic is sent.
Workaround: Enable the warm reboot command. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 05-MAY-2015 |
|
Known Affected Releases: | 15.2(1)T1, 15.2(2)T1 |
|
Known Fixed Releases: | 15.2(1.2.3)PI22, 15.2(2)T3.5, 15.2(2)T4, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.5, 15.2(4)M4, 15.2(4)M5, 15.2(4)M6 |
|
|
| |
| |
Bug Id: | CSCuj06856 |
Title: | Memory leak in Normal Buffers @if_hdlc32_rx_isr |
|
Description: | Symptom: Memory leak of normal buffers.
Conditions: Cisco 2900 series routers with a VWIC2-xMFT-T1/E1 installed, with TDM clocking (clock source line or clock source internal)
Workaround: To configure the command "clock source line independent' under channel-group.
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 05-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M4.3 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuo18238 |
Title: | CWS towers do not come up if crypto init is delayed |
|
Description: | Symptom: CWS Towers will be down
Conditions: Power off and on the device
Workaround: Remove and add CWS configs
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 07-MAY-2015 |
|
Known Affected Releases: | 15.4(2.8)T |
|
Known Fixed Releases: | 15.3(3)M4, 15.4(2.16)T, 15.4(3)M |
|
|
| |
| |
Bug Id: | CSCuh36583 |
Title: | ISRG2 - DSP Crash due to Backplane Switch Lockup During T1 Errors |
|
Description: | Symptom: An ISR G2 router using a PVDM3 may experience simultaneous failure on several DSPs. Eg:
DSPRM-3-DSPALARMINFO Device (0/1) Host GIGE ack timeout DSPRM-3-DSPALARMINFO DSP (0/7) Host keepalive timeout
Conditions: May be seen when T1 errors cause the router's backplane switch to hang, preventing proper function of the DSPs.
Workaround: Attempt to fix any T1 clock source misconfig.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 08-MAY-2015 |
|
Known Affected Releases: | 15.1(4)M4 |
|
Known Fixed Releases: | 15.1(4)M10, 15.5(2.10)T |
|
|
| |
| |
Bug Id: | CSCur70959 |
Title: | Memory leak @ sipContentObjPvtSetBody |
|
Description: | Symptom: Memory leak on processor pool occurs when SIP phones register via a register pool (e.g. voice register pool 60) using TCP.
The leak is reflected as the "CCSIP_SPI_CONTROL" and "Dialog Manager" processes:
Head Total(b) Used(b) Free(b) Lowest(b) Largest(b) Processor 129E0FDC 1844461672 926816936 917644736 695680236 641408232 I/O 3D000000 50331648 32294840 18036808 17988704 15203772
PID TTY Allocated Freed Holding Getbufs Retbufs Process 307 0 635342772 306024464 320536812 0 0 Dialog Manager 384 0 107120680 107902680 221925672 0 0 CCSIP_SPI_CONTRO 0 0 347781848 163431556 176266660 0 0 *Init* 0 0 0 0 142589620 0 0 *MallocLite*
PC Total Count Name 0x0897CE54 198191196 90251 CCSIP_SPI_CONTROL 0x088E2864 81210960 90268 CCSIP_SPI_CONTROL 0x088E2824 81207048 90256 Dialog Manager 0x0469D474 48614232 39588 *Packet Header*
Conditions: Registration method must be via a voice registration pool with TCP.
Workaround: Use UDP in the pools to register SIP phones.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 12-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M6.1 |
|
Known Fixed Releases: | 15.2(4)M8, 15.3(3)S5.8, 15.4(3)M2.2, 15.4(3)S2.11, 15.5(1)S1.1, 15.5(1)T1.1, 15.5(2)S0.7, 15.5(2.16)S, 15.5(2.7)T |
|
|
| |
| |
Bug Id: | CSCup93071 |
Title: | High RTT value causing IPSLA to fail though remote end is reachable |
|
Description: | Symptom: RTT is very high in a failure state & at a reasonable level otherwise
Conditions:
Workaround: Remove the IP SLA configuration from the router and reapply it. At that time everything begins functioning as expected.
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 15-MAY-2015 |
|
Known Affected Releases: | 15.0(1)M8 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtx98399 |
Title: | cisco 2921 crashing Detect PCIe 0 error, 0x00000054, |
|
Description: | Symptom:
2921 crashes with below error
001248: Jan 27 18:00:40.384: %PLATFORM-0-PCIE_ERR: PCIe advanced error report: Detect PCIe 0 error, 0x00000054, 0x00000000, 0x00000000, 0x00000000, 0x00000000
Conditions:
Workaround: |
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 16-MAY-2015 |
|
Known Affected Releases: | 15.0(1)M4 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCua50697 |
Title: | T1 interface behavior inconsistent across WIC Modules |
|
Description: | Symptoms: After unplugging and reconnecting a T1 cable, the T1 controller remains down or report continuous errors. After a router reload, the T1 controller remains up until the cable is disconnected again.
Conditions: This symptom affects only the following cards: HWIC-xCE1T1-PRI, NM-8CE1T1-PRI, VWIC3-xMFT-T1/E1, and GRWIC-xCE1T1-PRI. Also, the T1 signal must be somewhat out-of-specification according to T1.403 standards.
Workaround 1: Reload the router with the T1 cable plugged in.
Workaround 2: Step 1) Upgrade to a fixed-in Cisco IOS version. Step 2) Issue the following commands (hidden, so tab complete will not work):
enable config t controller ! ( example: controller t1 0/0/0 ) hwic_t1e1 equalize
Step 3) Shut/no shut the T1 controller, or reload the router to allow the CLI to take effect. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.2(3.15)T |
|
Known Fixed Releases: | 15.1(4)M5.7, 15.1(4)M6, 15.2(1.2.3)PI22, 15.2(4)M2.2, 15.2(4)M3, 15.2(4)XB11, 15.3(1.3)T |
|
|
| |
| |
Bug Id: | CSCud96075 |
Title: | IOS crash due to DSP crash when Transcoder is activated |
|
Description: | Symptom: A router running Cisco IOS Release 15.2(4)M2 will reload with a bus error soon after the DSP reloads when there is a live transcoding session.
Conditions: This symptom is observed with Cisco IOS Release 15.2(4)M2.
Workaround: There is no workaround.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M2 |
|
Known Fixed Releases: | 15.1(4)M7.4, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.4, 15.2(4)M4, 15.2(4)M5 |
|
|
| |
| |
Bug Id: | CSCuj86253 |
Title: | 2900 w/ Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's drops 50% multicast |
|
Description: | Symptom: Cisco 2900 with Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's (one per SVI) drops 50% multicast on pre-existing and working L2TPv3 sessions when attempting to establish a new L2TPv3 tunnel to a new destination that is not yet reachable/configured. Conditions: Cisco 2900 with Multiple EHWIC-4ESG-P's
pseudowire-class L2TP encapsulation l2tpv3 interworking ethernet ip local interface Loopback100 ! interface GigabitEthernet0/0/0 switchport access vlan 101 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/1 switchport access vlan 102 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/2 switchport access vlan 103 no ip address shutdown spanning-tree portfast ! interface Vlan101 no ip address xconnect 192.168.1.181 101 pw-class L2TP ! interface Vlan102 no ip address xconnect 192.168.1.182 102 pw-class L2TP ! interface Vlan103 no ip address xconnect 192.168.1.183 103 pw-class L2TP Workaround: Physically cable EHWIC-4ESG-P to the onboard c2900 GigE interface and tie L2TPv3 tunnels to dot1q sub interfaces:
pseudowire-class L2TP encapsulation l2tpv3 interworking ethernet ip local interface Loopback100 ! interface GigabitEthernet0/1 no ip address ! interface GigabitEthernet0/1.101 encapsulation dot1Q 101 xconnect 192.168.255.2 101 pw-class L2TP ! interface GigabitEthernet0/1.102 encapsulation dot1Q 102 xconnect 192.168.255.3 102 pw-class L2TP ! interface GigabitEthernet0/1.103 encapsulation dot1Q 103 xconnect 192.168.255.4 104 pw-class L2TP ! interface GigabitEthernet0/0/0 switchport access vlan 101 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/1 switchport access vlan 102 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/2 switchport access vlan 103 no ip address spanning-tree portfast ! interface GigabitEthernet0/0/3 switchport mode trunk no ip address
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M2, 15.4(2)T1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut86321 |
Title: | Tx hang on 2951`s GigabitEthernet IF |
|
Description: | Symptom: 2951`s Gi interface is hung. the output rate drop to 0 and the output queue got stuck at 40/40.
Conditions: - hardware is PQ3_TSEC - with duplex half - Output queue got 40/40
Workaround: "shut/no shut" the IF
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 19-MAY-2015 |
|
Known Affected Releases: | n/a |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus77335 |
Title: | Tags are not set for OSPF/EIGRP packets with VRF. |
|
Description: | Symptom: When vrf is configured, sgt is not picked-up correctly for OSPF/EIGRP packets.
Conditions: Occurs only when vrf is configured
Workaround: None
Further Problem Description: To query the correct sgt value from the relevant vrf, the tableid is extracted from pak->table_id. But in this case, the tableid is still not set and the query goes to default tableid (0). As the binding will not be in the default tableid for this vrf, value of '0' is returned. |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 15.4(3)M |
|
Known Fixed Releases: | 15.5(1.18)S0.11, 15.5(2)S, 15.5(2.11)T, 15.5(2.13)S, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28 |
|
|
| |
| |
Bug Id: | CSCuh66763 |
Title: | Localization of hardcoded English phrases for SCCP phones |
|
Description: | Symptom: Following phrases are dispalyed in English irresprctive of locale configured on CME.
"Next" "Previous" "Please modify number" "Invalid speed dial number" "Invalid personal speed dial number" "Invalid blf speed dial number" "Personal speed dial number can not exceed 32 digits" "Personal speed dial label can not exceed 30 characters" "Speed dial number can not exceed 24 digits" "The record is full" "Please delete unuse entry" "Logging Out" "CME hardware conference" "CME software conference" "add party allowed" "add party not allowed" "Whisper" "CME group pickup" "CME pickup" "Access Mailbox (trnsfVM)" "Failed to send call to Mobile Phone" "Live Record is not enable" "Live Record already in progress" "Not conference creator" "Live Record has stopped" "Live Record timeout" Conditions: This symptom is observed when you configure non-English user-locale. Workaround: There is no workaround.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 21-MAY-2015 |
|
Known Affected Releases: | 15.3(2.23)T |
|
Known Fixed Releases: | 15.2(1.2.37)PI23, 15.3(2.19)S0.13, 15.3(2.25)M0.11, 15.3(3)M, 15.3(3)M0.1, 15.3(3)M1, 15.3(3)M2, 15.3(3)M3, 15.3(3)M4, 15.3(3)S |
|
|
| |
| |
Bug Id: | CSCuq36627 |
Title: | WAAS Express:Failed to create SSL session. (no available resources) |
|
Description: | Symptom: WAAS-X SSL error message seen when SSL-AO is enabled Failed to create SSL session. (no available resources)
Conditions: The problem is seen if there are too many Aborts of the SSL session when packets are in flight.
Workaround: Disable SSL-AO and only use TDL
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.2(4.0.1) |
|
Known Fixed Releases: | 12.2(33)CX, 12.2(33)IRC, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16, 12.2(33)SB17, 12.2(33)SB4, 12.2(33)SB6a, 12.2(33)SB6aa |
|
|
| |
| |
Bug Id: | CSCuo73682 |
Title: | Router locks up after Bing search must be rebooted - No crash dump. |
|
Description: | Symptoms: A vulnerability in the Network Based Application Recognition (NBAR) protocol process of the Cisco 2900 Integrated Services Router could allow an unauthenticated remote attacker to cause a denial of service.
The vulnerability is due to the Network Based Application Recognition (NBAR) process locking up. An attacker could exploit this by sending simple IP Version 4 packets through the router. An exploit could allow the attacker to cause a denial of service event that would require a router restart
Conditions: NBAR Processes running on Internet Interface.
Workaround: None.
Further Problem Description: NBAR running on a 2900 series router interface.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2015-0586 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 22-MAY-2015 |
|
Known Affected Releases: | 15.3(3)M |
|
Known Fixed Releases: | 15.3(3)M3, 15.3(3)M3.1, 15.3(3)M4, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4 |
|
|
| |
| |
Bug Id: | CSCuc42558 |
Title: | Memory leak in CCSIP_SPI_CONTROL @ url_parseTelUrl |
|
Description: | Symptom:A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or cause memory leaks that may result in system instabilities. To exploit this vulnerability, affected devices must be configured to process SIP messages. Limited Cisco IOS Software releases are affected.
Cisco has released free software updates that address this vulnerability.
There are no workarounds for devices that must run SIP; however, mitigations are available to limit exposure to the vulnerability.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip
Conditions:See affected products section of the advisory.
Workaround:See the workarounds section of the advisory.
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.1(4)M4, 15.1(4)M5 |
|
Known Fixed Releases: | 15.1(4)GC2, 15.1(4)M6 |
|
|
| |
| |
Bug Id: | CSCtl65489 |
Title: | ccm process memory corruption and core due to specific SIP call flow |
|
Description: | Symptom:
The Cisco CallManager service on Unified CM stops processing calls and generates a core dump.
Conditions:
Occurs during specific SIP call flows that lead to memory corruption.
Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-2480 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.0M |
|
Known Fixed Releases: | 12.4(15)SW8, 12.4(15)SW9, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ2d, 12.4(15)XQ8, 12.4(2)XB12, 12.4(22)XR12, 12.4(22)YE6, 12.4(24)MD6 |
|
|
| |
| |
Bug Id: | CSCub13317 |
Title: | Cisco 2900 with VWIC2-2MFT-T1/E1 ; increasing input errors and CRC error |
|
Description: | Symptom: Cisco 2900 with VWIC2-2MFT-T1/E1 in TDM/HDLC mode doesn't forward any traffic across the serial interface after certain amount of time Conditions: Configure frame relay over VWIC2 channel-group in TDM/HDLC mode Workaround: Configure VWIC2 ports for "clock source line independent" if using VWIC2 for data channels only. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C CVE ID CVE-2012-3918 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.0(1)M5 |
|
Known Fixed Releases: | 15.0(1)M10, 15.0(1)M8.19, 15.0(1)M9, 15.1(4)M5.4, 15.1(4)M6, 15.1(4)M7, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC |
|
|
| |
| |
Bug Id: | CSCtu22280 |
Title: | ISM-VPN may leak plaintext data from previous encrypted packets |
|
Description: | Symptom: Packets sent in clear on encrypted link
Condition: Cisco Software in Cisco VPN Internal Service Module (VPN ISM) contains a vulnerability that could allow an unauthenticated, remote attacker to gain access to sensitive information on a targeted system.
The vulnerability resides in the encryption library used by the vulnerable software. This library allows a portion of an encrypted packet to be sent unencrypted in the following packet. The vulnerability is specific only when Internet Protocol Security (IPSec) is used, as in the case with Virtual Private Network (VPN) environments. If an unauthenticated, remote attacker could access an encrypted session, the attacker could obtain unencrypted packets that would contain information. This attacker could possibly benefit from this information and possibly launch further attacks.
Workaround: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6: https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C
CVE ID CVE-2011-4667 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html |
|
Status: | Fixed |
|
Severity: | 1 Catastrophic |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.2(1)T1 |
|
Known Fixed Releases: | 15.2(1.13)T, 15.2(2.12)T |
|
|
| |
| |
Bug Id: | CSCut98625 |
Title: | Same as CSCul29143 ASSERTION FAILED : ..vtsp.c: vtsp_cdb_assert |
|
Description: | Symptom: Router logs the following messages just before the crash: ASSERTION FAILED : ../VIEW_ROOT/cisco.comp/uc_infra/src/voip/ccvtsp/vtsp.c: vtsp_cdb_assert: 1606: unkn -Traceback= 35620FC4z 3566C9FCz 356557BCz 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z
ASSERTION FAILED : ../VIEW_ROOT/cisco.comp/uc_infra/src/voip/ccvtsp/vtsp.c: vtsp_cdb_assert: 1606: unkn -Traceback= 35621018z 3566C9FCz 35655C70z 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z
%SYS-3-MGDTIMER: Uninitialized timer, timer stop, timer = 227E1DB0. -Process= "DSMP", ipl= 0, pid= 446 -Traceback= 34F59FECz 35621018z 3566C9FCz 35655C70z 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z
Conditions:
Workaround: None
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 15.3(3)M4.2 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuj91556 |
Title: | Memory leak in small buffer using ISM-VPN module |
|
Description: | Symptom: With ISM-VPN module inserted on C2911, we observe leak in small buffer: ------ show buffers --------- Public buffer pools: Small buffers, 104 bytes (total 15204, permanent 50, peak 15204 @ 00:00:06): 29 in free list (20 min, 150 max allowed) 24337961 hits, 6620 misses, 1600 trims, 16754 created 0 failures (0 no memory)
CCL-2911-2#sh buffer usage Statistics for the Small pool
Output IDB : IS0/1 count: 15159 Caller pc : 0x3013D954 count: 15159 Resource User: Call Manag count: 15159
+CCL-2911-2#sh buffer leak resource user Resource User: Call Manager X count: 14727 Resource User: Init count: 30 Resource User: IP Input count: 9 Resource User: CCH323_CT count: 13 Resource User: EEM ED Syslog count: 32 Resource User: ISM-VPN Backgr count: 1025 Resource User: MFIB_mrib_read count: 3
Conditions: This symptom is only observed in device having ISM-VPN module. I/O memory leak has been observed at fast rate and completely dropped within 2 weeks.
Workaround: There is no workaround.
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M2.9 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCtw78539 |
Title: | 2900 GE in 10Mbps: TX ring stuck %ALIGN-3-TRACE at cn_xfr_ge_safe_start |
|
Description: | Symptom: A Cisco ISR router running Cisco IOS Release 15.2(2)T may lose the ability to forward traffic via its Gigabit Ethernet interface due to a stuck Tx ring.
Conditions: This symptom is observed with Cisco IOS Release 15.2(1)T1, 15.2(2)T, and 15.2(4)M. This is a regression issue that does not affect 15.1(4)M2 based on anecdotal accounts.
During the event the following logs can be seen which indicate a spurious memory access has occurred: %ALIGN-3-SPURIOUS: Spurious memory access made at 0xXXXXXXXX reading 0x0 %ALIGN-3-TRACE: -Traceback= 0xXXXXXXXX ...
At this time, the Tx ring of the interface becomes hung, causing packet drops to accumulate at the output queue (as seen via "show interface"), effectively preventing traffic flow. Eg:
Total output drops: 25185 Output queue: 331/1000/25184 (size/max total/drops)
Workaround: Reload the router or bounce the interface via "shut"/"no shut".
Further Problem Description: |
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 27-MAY-2015 |
|
Known Affected Releases: | 15.2(2)T |
|
Known Fixed Releases: | 15.2(1)T3.3, 15.2(1)T4, 15.2(1.2.3)PI22, 15.2(2)T3.5, 15.2(2)T4, 15.2(3)T4, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M2.8 |
|
|
| |
| |
Bug Id: | CSCuh29880 |
Title: | CPUHOG watchdog crash shdsl_efm background |
|
Description: | Symptom: Device crashes with similar logs:
SYS-2-WATCHDOG Process aborted on watchdog timeout, process = shdsl_efm background
-Traceback= 0x48A7DB8z 0x48A8B94z 0x48C54F8z 0x48A3C0Cz 0x48A35D4z 0x48A37D0z 0x4899EC8z 0x489A7ECz 0x4C4157Cz 0x4C268F0z
Conditions: hwic-4shdsl-e
Workaround: Unknown
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.2(4)M1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu49052 |
Title: | Per-Tunnel QOS Dropping CS6 Traffic |
|
Description: | Symptom: Per-Tunnel QOS Dropping on DMVPN HUB dropping CS6 Traffic
Conditions: Upon applying and QOS policy to a DMVPN hub this could result in CS6 control plane traffic being dropped on the egress. Which results in one-way communication with traffic being received from the spokes but not responded to by the HUB. In this condition no drops will be present within the [show policy-map multipoint tunnel #] output for the corresponding class which matches CS6 traffic.
HUB(config)#do sho logg | i PIM PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2909637817 PIM(0): Received v2 hello on Tunnel0 from 10.0.0.2 PIM(0): Neighbor (10.0.0.2) Hello GENID = 2911155061 PIM(0): Received v2 hello on Tunnel0 from 10.0.0.3 PIM(0): Neighbor (10.0.0.3) Hello GENID = 3278157996 HUB(config)#
###Hello Never Received by Spoke#### Spoke2#sho log | i PIM PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2911155061 PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2911155061
Workaround: NONE
Further Problem Description:
|
|
Status: | Other |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.4(3)M1 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut45177 |
Title: | CWS HTTPs traffic fails to load on ISR configured with NVI |
|
Description: | Symptom:When Cloud Web Security and NAT Virtual Interface are configured on the same box, CWS will fail to load HTTPS traffic on any client that is subject to redirection to CWS. HTTP traffic will display correctly in the browser as expected.
NAT Virtual Interfaces are required to be used in VRF-lite configurations if the inside and outside interfaces are both in two different VRFs.
Conditions:CWS and NVI (NAT Virtual Interface) need to be configured together on the ISR.
Workaround:Use traditonal Nat to identify the NAT inside and outside interface in VRF-Lite setups where only one interface is in a VRF and another interface is in global.
If when using VRF-Lite and both interfaces are in different VRFs then there is no workarounds at this time.
More Info:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 28-MAY-2015 |
|
Known Affected Releases: | 15.4(3)M, 15.5(1)T |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus95177 |
Title: | MAINBOARD-2-INITFAIL on multiple 2911 routers |
|
Description: | Symptom: A cisco 2911 router may crash due to a Signal 20 cache error or failure to analyze the Mother board Gigabit Ethernet interfaces. The following messages will be displayed on the console when this occurs:
%MAINBOARD-2-INITFAIL: Mother board Gigabit Ethernet analyze 0 failed %MGF-2-INTERNAL: Multi-Gigabit Fabric Internal Error: Failed to initialize Backplane Virtual Interface
Error: primary instr cache, fields: , virtual addr 0x332B3510, physical addr(21:3) 0x0014F0, vAddr(14:12) 0x1000 virtual address corresponds to main:text, cache word 2
Cache Data not Available for CPU D07
Low Data High Data Par Low Data High Data Par DRAM Data: 0:0x00000000 0x00000000 0x00 1:0x00000000 0x00000000 0x00 2:0x00000000 0x00000000 0x00 3:0x00000000 0x00000000 0x00
Conditions: Unknown at this time.
Workaround: none
Further Problem Description:
|
|
Status: | Terminated |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 15.3(3)M4 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus95226 |
Title: | Compact Flash corruption due to call-home directory being created |
|
Description: | Symptom: A cisco 2911 router fails to boot due to a corrupted compact flash. When the problem occurs, the following messages will be displayed on the console:
*Jan 31 09:42:22.419: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:15189 Chunk:0x21A03EC4 Name:FDNODE -Process= "Init", ipl= 4, pid= 3 -Traceback= 3051B2C4z 3051B538z 30522B54z 30521E0Cz 3052C320z 305356ECz 3210D498z 3210EC18z 32108E60z 30BC73E8z 30BC94F0z 3069E94Cz 3069FD34z 3067E734z 302F49ACz 3067F430z
Removing the compact flash and reading it on a PC shows a directory called "call-home" that is corrupted (the directory size is 1.2gb even though the actual size of the flash is only 256mb). Manually deleting the "call-home" directory results in the router correctly booting from the flash
Conditions:
Workaround: Manually delete the call-home directory on the flash then reinstall the flash card in the router.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 31-MAY-2015 |
|
Known Affected Releases: | 15.3(3)M4 |
|
Known Fixed Releases: | 15.4(3)M2.1, 15.4(3)S2.10, 15.5(1)S1.1, 15.5(2)S0.3, 15.5(2)T0.1, 15.5(2.22)S, 15.5(2.8)T, 16.1(0.277) |
|
|
| |
没有评论:
发表评论