Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -Cisco 2900 Series Router-01-Jun-2015 17:10 GMT

 

 

 

 

 

 

 


Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
Cisco Network Assistant
Release Version:
6.2.0
Alert Type:
New File
File Name:
cna-windows-k9-installer-6-2-0-en.exe
File Description:

Network Assistant English Installer

File Release Date:
27-MAY-2015
Alert Type:
New File
File Name:
cna-mac-k9-installer-6-2-0-en.zip
File Description:

Network Assistant English Mac Installer

File Release Date:
27-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M1
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
04-MAY-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL

Software Advisory Date:
04-MAY-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.1T4
Release Date:
26-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
Cisco Network Assistant
Release Version:
6.2.0
Alert Type:
New File
File Name:
cna-windows-k9-installer-6-2-0-en.exe
File Description:

Network Assistant English Installer

File Release Date:
27-MAY-2015
Alert Type:
New File
File Name:
cna-mac-k9-installer-6-2-0-en.zip
File Description:

Network Assistant English Mac Installer

File Release Date:
27-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2901 Integrated Services Router
Software Type:
Cisco Network Assistant
Release Version:
6.2.0
Alert Type:
New File
File Name:
cna-mac-k9-installer-6-2-0-en.zip
File Description:

Network Assistant English Mac Installer

File Release Date:
27-MAY-2015
Alert Type:
New File
File Name:
cna-windows-k9-installer-6-2-0-en.exe
File Description:

Network Assistant English Installer

File Release Date:
27-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.1T4
Release Date:
26-MAY-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M1
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
04-MAY-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL

Software Advisory Date:
04-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M1
Alert Type:
Software Advisory
File Name:
c2951-universalk9-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL

Software Advisory Date:
04-MAY-2015
Alert Type:
Software Advisory
File Name:
c2951-universalk9_npe-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
04-MAY-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.1T4
Release Date:
26-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.1T4
Release Date:
26-MAY-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M1
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL

Software Advisory Date:
04-MAY-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-3.M1.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
04-MAY-2015
Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
Cisco Network Assistant
Release Version:
6.2.0
Alert Type:
New File
File Name:
cna-mac-k9-installer-6-2-0-en.zip
File Description:

Network Assistant English Mac Installer

File Release Date:
27-MAY-2015
Alert Type:
New File
File Name:
cna-windows-k9-installer-6-2-0-en.exe
File Description:

Network Assistant English Installer

File Release Date:
27-MAY-2015
Find additional information in Software Downloads index.

Known Bugs - 2900 Series Integrated Services Routers

Bug Id:
CSCsx35705
Title:
c2951 crashes @ AFW_Process_EventQueueOverloaded with BACD call
Description:

Crash seen on a router running 15.2(4)M1
Router is configured with Voice/Tcl expression evaluation.

Current State:
So far, this appears to be a corner case. Few instances where we saw this
problem, crash happened only once. Problem could not be reproduced in a
consistent manner.


If you are a Cisco customer and suspect running into this problem (frequently -
more than once) and Cisco/TAC confirms that you are indeed running into this,
please consider setting the router to write the core file and wait for the next
occurrence.

4/25/2013
Another bug entirely related to this is CSCuf86086. To read about this, please
visit
tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCuf86086

NOTE:
Only one customer has so far been affected by this bug. It is still in a state
that it is not consistently reproducible.


If you are a Cisco customer and suspect running into this problem (frequently -
more than once) and Cisco/TAC confirms that you are indeed running into this,
please consider setting the router to write the core file and wait for the next
occurrence.

Status:
Terminated
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
12.4(23.5.2)PIX11
Known Fixed Releases:
Bug Id:
CSCua05196
Title:
C2900 crashed at 'cvmx_fpa_shutdown_pool' function due to reload cmd
Description:

Symptoms: After the reload command is entered, the router gets crashed.

Conditions: This symptom occurs when SSH traffic is sent.

Workaround: Enable the warm reboot command.

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
15.2(1)T1, 15.2(2)T1
Known Fixed Releases:
15.2(1.2.3)PI22, 15.2(2)T3.5, 15.2(2)T4, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.5, 15.2(4)M4, 15.2(4)M5, 15.2(4)M6
Bug Id:
CSCuj06856
Title:
Memory leak in Normal Buffers @if_hdlc32_rx_isr
Description:

Symptom:
Memory leak of normal buffers.

Conditions:
Cisco 2900 series routers with a VWIC2-xMFT-T1/E1 installed, with TDM clocking (clock source line
or clock source internal)

Workaround:
To configure the command "clock source line independent' under channel-group.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
05-MAY-2015
Known Affected Releases:
15.2(4)M4.3
Known Fixed Releases:
Bug Id:
CSCuo18238
Title:
CWS towers do not come up if crypto init is delayed
Description:

Symptom:
CWS Towers will be down

Conditions:
Power off and on the device

Workaround:
Remove and add CWS configs

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
15.4(2.8)T
Known Fixed Releases:
15.3(3)M4, 15.4(2.16)T, 15.4(3)M
Bug Id:
CSCuh36583
Title:
ISRG2 - DSP Crash due to Backplane Switch Lockup During T1 Errors
Description:

Symptom:
An ISR G2 router using a PVDM3 may experience simultaneous failure on several DSPs. Eg:

DSPRM-3-DSPALARMINFO Device (0/1) Host GIGE ack timeout
DSPRM-3-DSPALARMINFO DSP (0/7) Host keepalive timeout

Conditions:
May be seen when T1 errors cause the router's backplane switch to hang, preventing proper function of the DSPs.

Workaround:
Attempt to fix any T1 clock source misconfig.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
15.1(4)M4
Known Fixed Releases:
15.1(4)M10, 15.5(2.10)T
Bug Id:
CSCur70959
Title:
Memory leak @ sipContentObjPvtSetBody
Description:

Symptom:
Memory leak on processor pool occurs when SIP phones register via a register pool (e.g. voice register pool 60) using TCP.

The leak is reflected as the "CCSIP_SPI_CONTROL" and "Dialog Manager" processes:

Head Total(b) Used(b) Free(b) Lowest(b) Largest(b)
Processor 129E0FDC 1844461672 926816936 917644736 695680236 641408232
I/O 3D000000 50331648 32294840 18036808 17988704 15203772

PID TTY Allocated Freed Holding Getbufs Retbufs Process
307 0 635342772 306024464 320536812 0 0 Dialog Manager
384 0 107120680 107902680 221925672 0 0 CCSIP_SPI_CONTRO
0 0 347781848 163431556 176266660 0 0 *Init*
0 0 0 0 142589620 0 0 *MallocLite*

PC Total Count Name
0x0897CE54 198191196 90251 CCSIP_SPI_CONTROL
0x088E2864 81210960 90268 CCSIP_SPI_CONTROL
0x088E2824 81207048 90256 Dialog Manager
0x0469D474 48614232 39588 *Packet Header*

Conditions:
Registration method must be via a voice registration pool with TCP.

Workaround:
Use UDP in the pools to register SIP phones.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
15.2(4)M6.1
Known Fixed Releases:
15.2(4)M8, 15.3(3)S5.8, 15.4(3)M2.2, 15.4(3)S2.11, 15.5(1)S1.1, 15.5(1)T1.1, 15.5(2)S0.7, 15.5(2.16)S, 15.5(2.7)T
Bug Id:
CSCup93071
Title:
High RTT value causing IPSLA to fail though remote end is reachable
Description:

Symptom:
RTT is very high in a failure state & at a reasonable level otherwise

Conditions:

Workaround:
Remove the IP SLA configuration from the router and reapply it. At that time everything begins functioning as expected.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
15.0(1)M8
Known Fixed Releases:
Bug Id:
CSCtx98399
Title:
cisco 2921 crashing Detect PCIe 0 error, 0x00000054,
Description:

Symptom:

2921 crashes with below error

001248: Jan 27 18:00:40.384: %PLATFORM-0-PCIE_ERR: PCIe advanced error report: Detect PCIe 0 error, 0x00000054, 0x00000000, 0x00000000, 0x00000000, 0x00000000


Conditions:

Workaround:

Status:
Terminated
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
15.0(1)M4
Known Fixed Releases:
Bug Id:
CSCua50697
Title:
T1 interface behavior inconsistent across WIC Modules
Description:

Symptoms: After unplugging and reconnecting a T1 cable, the T1 controller
remains down or report continuous errors. After a router reload, the T1
controller remains up until the cable is disconnected again.

Conditions: This symptom affects only the following cards: HWIC-xCE1T1-PRI,
NM-8CE1T1-PRI, VWIC3-xMFT-T1/E1, and GRWIC-xCE1T1-PRI.
Also, the T1 signal must be somewhat out-of-specification according to T1.403
standards.

Workaround 1: Reload the router with the T1 cable plugged in.

Workaround 2:
Step 1) Upgrade to a fixed-in Cisco IOS version.
Step 2) Issue the following commands (hidden, so tab complete will not work):

enable
config t
controller ! ( example: controller t1 0/0/0 )
hwic_t1e1 equalize

Step 3) Shut/no shut the T1 controller, or reload the router to allow the CLI to
take effect.

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.2(3.15)T
Known Fixed Releases:
15.1(4)M5.7, 15.1(4)M6, 15.2(1.2.3)PI22, 15.2(4)M2.2, 15.2(4)M3, 15.2(4)XB11, 15.3(1.3)T
Bug Id:
CSCud96075
Title:
IOS crash due to DSP crash when Transcoder is activated
Description:

Symptom:
A router running Cisco IOS Release 15.2(4)M2 will reload with a bus
error soon after the DSP reloads when there is a live transcoding session.

Conditions:
This symptom is observed with Cisco IOS Release 15.2(4)M2.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.2(4)M2
Known Fixed Releases:
15.1(4)M7.4, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.4, 15.2(4)M4, 15.2(4)M5
Bug Id:
CSCuj86253
Title:
2900 w/ Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's drops 50% multicast
Description:

Symptom: Cisco 2900 with Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's (one per SVI) drops 50% multicast on pre-existing and working L2TPv3 sessions when attempting to establish a new L2TPv3 tunnel to a new destination that is not yet reachable/configured.
Conditions: Cisco 2900 with Multiple EHWIC-4ESG-P's

pseudowire-class L2TP
encapsulation l2tpv3
interworking ethernet
ip local interface Loopback100
!
interface GigabitEthernet0/0/0
switchport access vlan 101
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/1
switchport access vlan 102
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/2
switchport access vlan 103
no ip address
shutdown
spanning-tree portfast
!
interface Vlan101
no ip address
xconnect 192.168.1.181 101 pw-class L2TP
!
interface Vlan102
no ip address
xconnect 192.168.1.182 102 pw-class L2TP
!
interface Vlan103
no ip address
xconnect 192.168.1.183 103 pw-class L2TP
Workaround: Physically cable EHWIC-4ESG-P to the onboard c2900 GigE interface and tie L2TPv3 tunnels to dot1q sub interfaces:

pseudowire-class L2TP
encapsulation l2tpv3
interworking ethernet
ip local interface Loopback100
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/1.101
encapsulation dot1Q 101
xconnect 192.168.255.2 101 pw-class L2TP
!
interface GigabitEthernet0/1.102
encapsulation dot1Q 102
xconnect 192.168.255.3 102 pw-class L2TP
!
interface GigabitEthernet0/1.103
encapsulation dot1Q 103
xconnect 192.168.255.4 104 pw-class L2TP
!
interface GigabitEthernet0/0/0
switchport access vlan 101
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/1
switchport access vlan 102
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/2
switchport access vlan 103
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/3
switchport mode trunk
no ip address

Status:
Open
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
15.2(4)M2, 15.4(2)T1
Known Fixed Releases:
Bug Id:
CSCut86321
Title:
Tx hang on 2951`s GigabitEthernet IF
Description:

Symptom:
2951`s Gi interface is hung. the output rate drop to 0 and the output queue got stuck at 40/40.

Conditions:
- hardware is PQ3_TSEC
- with duplex half
- Output queue got 40/40

Workaround:
"shut/no shut" the IF

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCus77335
Title:
Tags are not set for OSPF/EIGRP packets with VRF.
Description:

Symptom:
When vrf is configured, sgt is not picked-up correctly for OSPF/EIGRP packets.

Conditions:
Occurs only when vrf is configured

Workaround:
None

Further Problem Description:
To query the correct sgt value from the relevant vrf, the tableid is extracted from pak->table_id. But in this case, the tableid is still not set and the query goes to default tableid (0). As the binding will not be in the default tableid for this vrf, value of '0' is returned.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
15.4(3)M
Known Fixed Releases:
15.5(1.18)S0.11, 15.5(2)S, 15.5(2.11)T, 15.5(2.13)S, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28
Bug Id:
CSCuh66763
Title:
Localization of hardcoded English phrases for SCCP phones
Description:

Symptom: Following phrases are dispalyed in English irresprctive of locale configured on CME.

"Next"
"Previous"
"Please modify number"
"Invalid speed dial number"
"Invalid personal speed dial number"
"Invalid blf speed dial number"
"Personal speed dial number can not exceed 32 digits"
"Personal speed dial label can not exceed 30 characters"
"Speed dial number can not exceed 24 digits"
"The record is full"
"Please delete unuse entry"
"Logging Out"
"CME hardware conference"
"CME software conference"
"add party allowed"
"add party not allowed"
"Whisper"
"CME group pickup"
"CME pickup"
"Access Mailbox (trnsfVM)"
"Failed to send call to Mobile Phone"
"Live Record is not enable"
"Live Record already in progress"
"Not conference creator"
"Live Record has stopped"
"Live Record timeout"
Conditions: This symptom is observed when you configure non-English user-locale.
Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
15.3(2.23)T
Known Fixed Releases:
15.2(1.2.37)PI23, 15.3(2.19)S0.13, 15.3(2.25)M0.11, 15.3(3)M, 15.3(3)M0.1, 15.3(3)M1, 15.3(3)M2, 15.3(3)M3, 15.3(3)M4, 15.3(3)S
Bug Id:
CSCuq36627
Title:
WAAS Express:Failed to create SSL session. (no available resources)
Description:

Symptom:
WAAS-X SSL error message seen when SSL-AO is enabled
Failed to create SSL session. (no available resources)

Conditions:
The problem is seen if there are too many Aborts of the SSL session when packets are in flight.

Workaround:
Disable SSL-AO and only use TDL

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
15.2(4.0.1)
Known Fixed Releases:
12.2(33)CX, 12.2(33)IRC, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16, 12.2(33)SB17, 12.2(33)SB4, 12.2(33)SB6a, 12.2(33)SB6aa
Bug Id:
CSCuo73682
Title:
Router locks up after Bing search must be rebooted - No crash dump.
Description:

Symptoms:
A vulnerability in the Network Based Application Recognition (NBAR) protocol process of the Cisco 2900 Integrated Services Router could allow an
unauthenticated remote attacker to cause a denial of service.

The vulnerability is due to the Network Based Application Recognition (NBAR) process locking up. An attacker could exploit this by sending
simple IP Version 4 packets through the router. An exploit could allow the attacker to cause a denial of service event that would require a
router restart

Conditions:
NBAR Processes running on Internet Interface.

Workaround:
None.

Further Problem Description:
NBAR running on a 2900 series router interface.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0586 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-MAY-2015
Known Affected Releases:
15.3(3)M
Known Fixed Releases:
15.3(3)M3, 15.3(3)M3.1, 15.3(3)M4, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4
Bug Id:
CSCuc42558
Title:
Memory leak in CCSIP_SPI_CONTROL @ url_parseTelUrl
Description:

Symptom:A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or cause memory leaks that may result in system instabilities. To exploit this vulnerability, affected devices must be configured to process SIP messages. Limited Cisco IOS Software releases are affected.

Cisco has released free software updates that address this vulnerability.

There are no workarounds for devices that must run SIP; however, mitigations are available to limit exposure to the vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip

Conditions:See affected products section of the advisory.

Workaround:See the workarounds section of the advisory.




Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(4)M4, 15.1(4)M5
Known Fixed Releases:
15.1(4)GC2, 15.1(4)M6
Bug Id:
CSCtl65489
Title:
ccm process memory corruption and core due to specific SIP call flow
Description:

Symptom:

The Cisco CallManager service on Unified CM stops processing calls and generates a core dump.

Conditions:

Occurs during specific SIP call flows that lead to memory corruption.

Workaround:

None.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 5.4/4.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-2480 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.0M
Known Fixed Releases:
12.4(15)SW8, 12.4(15)SW9, 12.4(15)T16, 12.4(15)T17, 12.4(15)XQ2d, 12.4(15)XQ8, 12.4(2)XB12, 12.4(22)XR12, 12.4(22)YE6, 12.4(24)MD6
Bug Id:
CSCub13317
Title:
Cisco 2900 with VWIC2-2MFT-T1/E1 ; increasing input errors and CRC error
Description:

Symptom:
Cisco 2900 with VWIC2-2MFT-T1/E1 in TDM/HDLC mode doesn't forward any traffic across the serial interface after certain amount of time
Conditions:
Configure frame relay over VWIC2 channel-group in TDM/HDLC mode
Workaround:
Configure VWIC2 ports for "clock source line independent" if using VWIC2 for data channels only.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-3918 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.0(1)M5
Known Fixed Releases:
15.0(1)M10, 15.0(1)M8.19, 15.0(1)M9, 15.1(4)M5.4, 15.1(4)M6, 15.1(4)M7, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC
Bug Id:
CSCtu22280
Title:
ISM-VPN may leak plaintext data from previous encrypted packets
Description:

Symptom:
Packets sent in clear on encrypted link

Condition:
Cisco Software in Cisco VPN Internal Service Module (VPN ISM) contains a vulnerability that could allow an unauthenticated, remote attacker to gain
access to sensitive information on a targeted system.

The vulnerability resides in the encryption library used by the vulnerable software. This library allows a portion of an encrypted packet to be sent
unencrypted in the following packet. The vulnerability is specific only when Internet Protocol Security (IPSec) is used, as in the case with Virtual
Private Network (VPN) environments. If an unauthenticated, remote attacker could access an encrypted session, the attacker could obtain
unencrypted packets that would contain information. This attacker could possibly benefit from this information and possibly launch further attacks.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2011-4667 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(1)T1
Known Fixed Releases:
15.2(1.13)T, 15.2(2.12)T
Bug Id:
CSCut98625
Title:
Same as CSCul29143 ASSERTION FAILED : ..vtsp.c: vtsp_cdb_assert
Description:

Symptom:
Router logs the following messages just before the crash:
ASSERTION FAILED : ../VIEW_ROOT/cisco.comp/uc_infra/src/voip/ccvtsp/vtsp.c: vtsp_cdb_assert: 1606: unkn
-Traceback= 35620FC4z 3566C9FCz 356557BCz 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z

ASSERTION FAILED : ../VIEW_ROOT/cisco.comp/uc_infra/src/voip/ccvtsp/vtsp.c: vtsp_cdb_assert: 1606: unkn
-Traceback= 35621018z 3566C9FCz 35655C70z 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z

%SYS-3-MGDTIMER: Uninitialized timer, timer stop, timer = 227E1DB0. -Process= "DSMP", ipl= 0, pid= 446
-Traceback= 34F59FECz 35621018z 3566C9FCz 35655C70z 35AC87FCz 35AC8F7Cz 3562E814z 3562EB58z 33294E34z 33294E18z

Conditions:

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(3)M4.2
Known Fixed Releases:
Bug Id:
CSCuj91556
Title:
Memory leak in small buffer using ISM-VPN module
Description:

Symptom:
With ISM-VPN module inserted on C2911, we observe leak in small buffer:
------ show buffers ---------
Public buffer pools:
Small buffers, 104 bytes (total 15204, permanent 50, peak 15204 @ 00:00:06):
29 in free list (20 min, 150 max allowed)
24337961 hits, 6620 misses, 1600 trims, 16754 created
0 failures (0 no memory)

CCL-2911-2#sh buffer usage
Statistics for the Small pool

Output IDB : IS0/1 count: 15159
Caller pc : 0x3013D954 count: 15159
Resource User: Call Manag count: 15159

+CCL-2911-2#sh buffer leak resource user
Resource User: Call Manager X count: 14727
Resource User: Init count: 30
Resource User: IP Input count: 9
Resource User: CCH323_CT count: 13
Resource User: EEM ED Syslog count: 32
Resource User: ISM-VPN Backgr count: 1025
Resource User: MFIB_mrib_read count: 3

Conditions:
This symptom is only observed in device having ISM-VPN module. I/O memory leak has been observed at fast rate and completely dropped within 2 weeks.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.2(4)M2.9
Known Fixed Releases:
Bug Id:
CSCtw78539
Title:
2900 GE in 10Mbps: TX ring stuck %ALIGN-3-TRACE at cn_xfr_ge_safe_start
Description:

Symptom:
A Cisco ISR router running Cisco IOS Release 15.2(2)T may lose the ability to forward traffic via its Gigabit Ethernet interface due to a stuck Tx ring.

Conditions:
This symptom is observed with Cisco IOS Release 15.2(1)T1, 15.2(2)T, and 15.2(4)M. This is a regression issue that does not affect 15.1(4)M2 based on anecdotal accounts.

During the event the following logs can be seen which indicate a spurious memory access has occurred:

%ALIGN-3-SPURIOUS: Spurious memory access made at 0xXXXXXXXX reading 0x0
%ALIGN-3-TRACE: -Traceback= 0xXXXXXXXX ...

At this time, the Tx ring of the interface becomes hung, causing packet drops to accumulate at the output queue (as seen via "show interface"), effectively preventing traffic flow. Eg:

Total output drops: 25185
Output queue: 331/1000/25184 (size/max total/drops)

Workaround:
Reload the router or bounce the interface via "shut"/"no shut".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.2(2)T
Known Fixed Releases:
15.2(1)T3.3, 15.2(1)T4, 15.2(1.2.3)PI22, 15.2(2)T3.5, 15.2(2)T4, 15.2(3)T4, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M2.8
Bug Id:
CSCuh29880
Title:
CPUHOG watchdog crash shdsl_efm background
Description:

Symptom:
Device crashes with similar logs:

SYS-2-WATCHDOG Process aborted on watchdog timeout, process = shdsl_efm background

-Traceback= 0x48A7DB8z 0x48A8B94z 0x48C54F8z 0x48A3C0Cz 0x48A35D4z 0x48A37D0z 0x4899EC8z 0x489A7ECz 0x4C4157Cz 0x4C268F0z

Conditions:
hwic-4shdsl-e

Workaround:
Unknown

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.2(4)M1
Known Fixed Releases:
Bug Id:
CSCuu49052
Title:
Per-Tunnel QOS Dropping CS6 Traffic
Description:

Symptom:
Per-Tunnel QOS Dropping on DMVPN HUB dropping CS6 Traffic

Conditions:
Upon applying and QOS policy to a DMVPN hub this could result in CS6 control plane traffic being dropped on the egress. Which results in one-way communication with traffic being received from the spokes but not responded to by the HUB. In this condition no drops will be present within the [show policy-map multipoint tunnel #] output for the corresponding class which matches CS6 traffic.

HUB(config)#do sho logg | i PIM
PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2909637817
PIM(0): Received v2 hello on Tunnel0 from 10.0.0.2
PIM(0): Neighbor (10.0.0.2) Hello GENID = 2911155061
PIM(0): Received v2 hello on Tunnel0 from 10.0.0.3
PIM(0): Neighbor (10.0.0.3) Hello GENID = 3278157996
HUB(config)#

###Hello Never Received by Spoke####
Spoke2#sho log | i PIM
PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2911155061
PIM(0): Send periodic v2 Hello on Tunnel0 with GenID = 2911155061

Workaround:
NONE

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.4(3)M1
Known Fixed Releases:
Bug Id:
CSCut45177
Title:
CWS HTTPs traffic fails to load on ISR configured with NVI
Description:

Symptom:When Cloud Web Security and NAT Virtual Interface are configured on the same box, CWS will fail to load HTTPS traffic on any client that is subject to redirection to CWS. HTTP traffic will display correctly in the browser as expected.

NAT Virtual Interfaces are required to be used in VRF-lite configurations if the inside and outside interfaces are both in two different VRFs.

Conditions:CWS and NVI (NAT Virtual Interface) need to be configured together on the ISR.

Workaround:Use traditonal Nat to identify the NAT inside and outside interface in VRF-Lite setups where only one interface is in a VRF and another interface is in global.

If when using VRF-Lite and both interfaces are in different VRFs then there is no workarounds at this time.

More Info:


Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
15.4(3)M, 15.5(1)T
Known Fixed Releases:
Bug Id:
CSCus95177
Title:
MAINBOARD-2-INITFAIL on multiple 2911 routers
Description:

Symptom:
A cisco 2911 router may crash due to a Signal 20 cache error or failure to analyze the Mother board Gigabit Ethernet interfaces. The following messages will be displayed on the console when this occurs:

%MAINBOARD-2-INITFAIL: Mother board Gigabit Ethernet analyze 0 failed
%MGF-2-INTERNAL: Multi-Gigabit Fabric Internal Error: Failed to initialize Backplane Virtual Interface

Error: primary instr cache, fields: ,
virtual addr 0x332B3510, physical addr(21:3) 0x0014F0, vAddr(14:12) 0x1000
virtual address corresponds to main:text, cache word 2

Cache Data not Available for CPU D07

Low Data High Data Par Low Data High Data Par
DRAM Data: 0:0x00000000 0x00000000 0x00 1:0x00000000 0x00000000 0x00
2:0x00000000 0x00000000 0x00 3:0x00000000 0x00000000 0x00

Conditions:
Unknown at this time.

Workaround:
none

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
Bug Id:
CSCus95226
Title:
Compact Flash corruption due to call-home directory being created
Description:

Symptom:
A cisco 2911 router fails to boot due to a corrupted compact flash. When the problem occurs, the following messages will be displayed on the console:

*Jan 31 09:42:22.419: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:15189 Chunk:0x21A03EC4 Name:FDNODE -Process= "Init", ipl= 4, pid= 3
-Traceback= 3051B2C4z 3051B538z 30522B54z 30521E0Cz 3052C320z 305356ECz 3210D498z 3210EC18z 32108E60z 30BC73E8z 30BC94F0z 3069E94Cz 3069FD34z 3067E734z 302F49ACz 3067F430z

Removing the compact flash and reading it on a PC shows a directory called "call-home" that is corrupted (the directory size is 1.2gb even though the actual size of the flash is only 256mb). Manually deleting the "call-home" directory results in the router correctly booting from the flash

Conditions:

Workaround:
Manually delete the call-home directory on the flash then reinstall the flash card in the router.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
31-MAY-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
15.4(3)M2.1, 15.4(3)S2.10, 15.5(1)S1.1, 15.5(2)S0.3, 15.5(2)T0.1, 15.5(2.22)S, 15.5(2.8)T, 16.1(0.277)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论