Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -ME 3800X Series Switch-01-Jun-2015 17:10 GMT

 

 

 

 

 

 

 


Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Alert Type:
New Release
Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Release Version:
15.4.3S3
Release Date:
29-MAY-2015

Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Alert Type:
 
 
Previously Suggested:
 

Find additional information in Software Downloads index.

Known Bugs - ME 3800X Series Carrier Ethernet Switch Routers

Bug Id:
CSCtx28468
Title:
ME-3800x crashes with specific ARP packet
Description:

Symptoms:
Cisco ME 3800X Series Carrier Ethernet Switch Routers may experience a device reload when receiving a series of ARP packets. An unauthenticated
attacker could cause a denial of service condition while sending these packets. The attacker must be layer-2 adjacent to the affected device in
order to trigger this vulnerability.

Conditions:
The attacker must be layer-2 adjacent to the affected device in order to trigger this vulnerability.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-1345 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-MAY-2015
Known Affected Releases:
15.1(2)EY1a
Known Fixed Releases:
15.1(2)EY2, 15.2(1.18)S0.8, 15.2(2)S, 15.2(2)SA, 15.2(2)SA1, 15.2(2)SA2, 15.2(2)SNI, 15.2(2.8)S, 15.2(4)S1c, 15.2(4)S2
Bug Id:
CSCtz40435
Title:
L4 Port-range ACL does not work on EVC on whales
Description:

Symptoms: The L4 port-range security ACL does not work on EVC.

Conditions: This symptom is seen when security ACL containing L4 port range
operation that is applied on EVC. The behavior is not as expected. The same
works on physical interface.

Workaround: Add support for L4 port range operation similar to the case of
applying it on physical interface.

PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet
the criteria for PSIRT ownership or involvement. This issue will be addressed
via normal resolution channels.

If you believe that there is new information that would cause a change in the
severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found
at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.2(2)S
Known Fixed Releases:
15.2(2)S0.4, 15.2(2)S1, 15.2(4)S1c, 15.2(4)S2, 15.2(4)S3, 15.2(4)S3a, 15.2(4)S4, 15.2(4)S4a, 15.2(4)S5, 15.2(4)S6
Bug Id:
CSCug36858
Title:
MET consumption increases continuously and is not freed up
Description:

Symptom:
Traffic through the 3600 causes MET consumption to increase continuously.

Conditions:
When traffic flows through an me3600, met consumption is increasing continuously. This eventually leads to met resources getting exhausted. The device could start throwing tracebacks and show unpredictable behavior. It could even eventually lead to crash of the box.

Workaround:
There are no known workarounds. Increasing the mac aging helps mitigate the issue. However, it doesn't fix it and will only delay the failure.

Further Problem Description:
met leak effecting multi cast functionality

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
15.3(1)S1, 15.3(2)S1
Known Fixed Releases:
15.3(2)S1b, 15.3(2)S1c, 15.3(2.19)S0.7, 15.3(3)S, 15.3(3)S1, 15.3(3)S1a, 15.3(3)S2, 15.3(3)S2a, 15.3(3)S3, 15.3(3)S4
Bug Id:
CSCuu34964
Title:
1588 Hybrid clk not moving to PA, flapping between UNKNOWN & FL
Description:

Symptom:
Hybrid clock not moving to phase aligned, flapping between UNKNOWN & Freq Locked

Conditions:
When hybrid clock master and slave is configured

Workaround:
There is no work aorund

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(1)S0.20
Known Fixed Releases:
Bug Id:
CSCuu17671
Title:
Crash@ nq_ccrm_tcam_calculator_check
Description:

Symptom:
Whales reloads with crashinfo file collected in flash:

Conditions:
Under non-trunk interface, while attaching service policy with class map configurations

Workaround:
There is no workaround

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
15.5(1)S
Known Fixed Releases:
15.5(1)S1.4
Bug Id:
CSCto98272
Title:
TCAM Array Parity errors found during POST
Description:

Symptoms: The following error is set on Power-On Self-Test (POST) for a few
ME3600 units:

POST: PortASIC CAM Subsystem Tests : Begin
TCAM APErr is set
POST: PortASIC CAM Subsystem Tests : End, Status Failed

Subsequent action is a crash, and the unit never boots up.

Another signature, is that the unit would go ahead and crashdump, in the IGMP subsystem init, at bootup. Watch out for this symptom, in case the boot up logs could not be captured.

Conditions: This symptom is observed on the default Cisco IOS load sequence,
when POST is enabled.

Workaround: This is not a hardware defect and does not need a unit RMA. It is a
software fault due to an erroneous initialization of the parity scan engine of
the TCAM. To prevent this error, use the boot-skip_post
command to load the IOS image. Otherwise, upgrade to an image which has the fix
for CSCtn38836 and CSCto98272.



Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
15.0(1)SE
Known Fixed Releases:
12.2(52)EY1c, 12.2(52)EY2, 15.2(0.1)S, 15.2(1)S

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论