Cisco Blog » The Platform

2015年6月1日星期一

Cisco Notification Alert -Nexus 3000 Series Switch-01-Jun-2015 17:10 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS EPLD Updates
Release Version:
7.0(3)I1(2)
Alert Type:
New File
File Name:
n9000-epld.7.0.3.I1.2.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 7.0(3)I1(2)

File Release Date:
17-MAY-2015

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4a)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4a.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4a)

File Release Date:
18-MAY-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1a)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1a.CSCut95590.bin
File Description:

Route-map Match Logic

File Release Date:
01-MAY-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS System Software
Release Version:
7.0(3)I1(2)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.2.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
17-MAY-2015

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3164Q Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4a)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4a.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
18-MAY-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 3000 Series Switches

Bug Id:
CSCuq43652
Title:
ppm crash while loading ACL
Description:

Symptom:
ppm crash while loading ACL. This issue happens when config session verify/commit in progress on switch A and switch B sends config sync lock/unlock request to switch A.

Conditions:
While loading acls to the switch, ppm gets crashed resulting in switch crash

In running-config, there is switch-profile (config sync) config

Workaround:
Disable config-sync

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
02-MAY-2015
Known Affected Releases:
6.0(2)U1(3)
Known Fixed Releases:
6.0(2)A3(3.75), 6.0(2)A3(4), 6.0(2)A4(0.890), 6.0(2)A4(1), 6.0(2)U3(3.75), 6.0(2)U3(4), 6.0(2)U4(0.890), 6.0(2)U4(1)
Bug Id:
CSCus75034
Title:
Nexus 3500 - Flexlink Mcast Fast Convergence - no IGMP report leak
Description:

Symptom:
No IGMP reports are leaked over Backup Standby Port in Flexlink configuration when Mcast fast convergence is configured.

No IGMP snooping entry is created on the upstream switch for the port connecting to the Backup port on the N3500 side.
This would lead to high Mcast convergence when Active Port goes down and Standby port becomes active as upstream switch would not be forwarding multicast traffic for the hosts connected on the N3500.

Conditions:
Flexlink configuration with Mcast Fast convergence configured:

switchport backup interface <> multicast fast-convergence

The upstream switch connecting to the backup port does not receive any IGMP reports for the hosts/receivers connected across N3500 switch.

Workaround:
Add static IGMP snooping entry on the Upstream switch connecting to the N3k backup port. Example if upstream is a N5k/N3k/N7k switch:
ip igmp snooping static-group interface <#port or po connecting to backup port>

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.0(2)A3(2.68), 6.0(2)A4(3)
Known Fixed Releases:
6.0(2)A6(0.65), 6.0(2)A6(1)
Bug Id:
CSCuq92870
Title:
Nexus 3500: MAC Address table not update correctly after mac move
Description:

Symptom:
MAC address table not synced properly between Nexus 3500 vPC peers, after vMotion

Conditions:
Issue seen in Nexus3500 after mac-address goes through vMotion (moving between two port-channels from Nexus3500 perspective).

Traffic should be flowing in such a way that both members of VPC should be getting traffic, to make sure both vpc peer are learning mac address via hardware new learn. After this , if the traffic flows from that mac moves via vmotion or any other mac move, then this issue can hit.

Workaround:
Clear mac address

Further Problem Description:
Mac-address gets updated on receiving a frame on local vPC port.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.0(2)A3(2.68)
Known Fixed Releases:
6.0(2)A4(3.41), 6.0(2)A4(4), 6.0(2)A6(0.48), 6.0(2)A6(1), 6.0(2)U4(3.41), 6.0(2)U4(4), 6.0(2)U6(0.48), 6.0(2)U6(1)
Bug Id:
CSCuq61825
Title:
Nexus3500: Packet received on access vPC port w/ vlan id 0 not processed
Description:

Symptom:
Nexus3500 does not process the packets received on an access vPC port. Happens only when a dot1q header with vlan id as 0 is received

Conditions:
The port is in access port, and part of a vPC.
Issue is seen in 6.0(2)A3 releases.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-MAY-2015
Known Affected Releases:
6.0(2)A3(2.68), 6.0(2)A4(1)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(6), 6.0(2)A6(1), 6.0(2)U4(4.47), 6.0(2)U4(5)
Bug Id:
CSCus34881
Title:
N3k - SNMPD crash due to segmentation fault polling port_manager
Description:

Symptom:
NX-OS SNMPd process crashes with HAP reset.

Conditions:
SNMP GET requests to IF-MIB may cause the SNMP deamon to crash due to a segmentation fault while trying to fetch the interface counters belonging to a port channel.

Workaround:
Do not poll OID's to collect interface counters belonging to a port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A5(1.37), 6.0(2)A5(2), 6.0(2)A6(0.64), 6.0(2)A6(0.66), 6.0(2)A6(0.78), 6.0(2)A6(1), 6.0(2)U5(1.37), 6.0(2)U5(2), 6.0(2)U6(0.64), 6.0(2)U6(0.66)
Bug Id:
CSCus34355
Title:
recursive-route updates not pushed to hardware in certain conditions
Description:

Symptom:
N3k continues to forward traffic to a failed HA box due to egress port not getting updated

Conditions:
Trigger for this issue is Mac Move of directly connected next-hop on vlan interface from one physical port to another physical port.

Affects only IPv4 recursive routes with single next-hop.

Workaround:
clear ip arp force-delete

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-MAY-2015
Known Affected Releases:
6.0(2)U4(1.35), 6.0(2)U4(1M)
Known Fixed Releases:
6.0(2)A4(3.36), 6.0(2)A4(3.41), 6.0(2)A4(4), 6.0(2)A5(0.34), 6.0(2)A5(1), 6.0(2)A5(1.37), 6.0(2)A5(2), 6.0(2)U4(3.36), 6.0(2)U4(3.41), 6.0(2)U4(4)
Bug Id:
CSCuq96923
Title:
Nexus 3500: Buffer Block stuck and drops all egress Multicast/Broadcast
Description:

Symptom:
Broadcast and multicast frames are not getting transmitted on one or more ports mapped to the affected buffer block.

Unicast traffic is not affected.

Conditions:
Issue is seen in Nexus 3500 running 6.0(2)A1(1c) release.

Workaround:
Reload of the switch.

Further Problem Description:
Nexus 3548 Switch Architecture White Paper:
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-3548-switch/white_paper_c11-715262.html

As mentioned in the above architecture white paper, following is the mapping of the ports to the buffer blocks:
Buffer Block #1: Ports 9-12, 21-24, 33-36, 45-48
Buffer Block #2: Ports 5-8, 17-20, 29-32, 41-44
Buffer Block #3: Ports 1-4, 13-16, 25-28, 37-40

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
07-MAY-2015
Known Affected Releases:
6.0(2)A1(1c)
Known Fixed Releases:
6.0(2)A1(0.100), 6.0(2)A1(1e), 6.0(2)A4(1.32), 6.0(2)A4(3), 6.0(2)U4(1.32), 6.0(2)U4(3)
Bug Id:
CSCup80823
Title:
SVI not responding to ARP request after reload
Description:

Symptom:
Incomplete ARPs entries can occur randomly after a Nexus 3000 switch is reloaded.

To verify this condition check if the following counter is incrementing -

sh ip arp statistics vlan 2000 interface-all
ARP packet statistics for interface: Vlan2000
...
Received:
Total 24576, Requests 0, Replies 0, Requests on L2 0, Replies on L2 0
Proxy arp 0, Local-Proxy arp 0, Tunneled 0, Fastpath 0, Snooped 0, Dropped 24576
Received packet drops details:
Appeared on a wrong interface : 24576 <<<<<<<<<<<<<<<<<<<<<<<<< This is incrementing

You may also see syslogs message like

%ARP-3-REQ_NON_AM: arp [3393] Sending ARP request for X.X.X.X on invalid interface VlanXXX request from pid: XXXX

Conditions:
After reloading the switch.

Workaround:
We can try bouncing the SVI and if this does not recover it then reload the switch again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-MAY-2015
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A3(3.70), 6.0(2)A3(4), 6.0(2)A4(0.817), 6.0(2)A4(1), 6.0(2)U3(3.70), 6.0(2)U3(4), 6.0(2)U4(0.817), 6.0(2)U4(1), 7.0(3)I2(0.122), 7.0(3)I2(1)
Bug Id:
CSCun37604
Title:
install add fails when we use non-mgmt ports for ftp/tftp/scp
Description:

Symptom:
install add fails

Conditions:
when we use location as ftp/scp/tftp using non-management vrf.

Workaround:
Use management vrf.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-MAY-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.1(0)D1(0.113), 7.1(0)D1(0.132), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.94), 7.1(0)ZD(0.178), 7.2(1)N1(0.1), 7.2(1)N1(1), 7.9(0)ZD(0.4)
Bug Id:
CSCui89328
Title:
Nexus 3500: All Ports Move to a Hardware Failure State
Description:

Symptom:
All the ports are shut down with the following error messages:

%NOHMS-2-NOHMS_DIAG_ERROR: Module 1: Runtime diag detected major event: Port failure: Ethernet /
%ETHPORT-3-IF_DOWN_HW_FAILURE: Interface Ethernet/ is down (Hardware Failure)

Conditions:
- Parity Error
- 6.0(2)A1(1a) or older

Workaround:
Reload the device.

Further Problem Description:
It is recommended to run 6.0(2)A1(1c) or later if you encounter this issue.

This bug changed the following:
- Only ports related to a soft parity error are moved into a failure state. This allows traffic to flow normally on unaffected ports prior to the reload.
- Provides more granular output in logs for the cause of the parity error.

Both changes are partially implemented in 6.0(2)A1(1b) and fully implemented 6.0(2)A1(1c) and later.

All ports shutting down in 6.0(2)A1(1b) may still be a soft parity error. If a Nexus 3500 shuts down all ports in 6.0(2)A1(1c) or later, the switch should be replaced.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-MAY-2015
Known Affected Releases:
6.0(2)A1(0.99)
Known Fixed Releases:
6.0(2)A1(1c)
Bug Id:
CSCup38101
Title:
Nexus 3548: Routed Traffic Matching CoPP Class Sent to CPU in Warp Mode
Description:

Symptom:
Intermittent routed traffic loss or high latency observed with traffic traversing a Nexus 3548

Conditions:
- 6.0(2)A3(x)
- Warp mode
- Layer 3 routed traffic matching a CoPP class-map

Workaround:
Revert to Normal mode

Further Problem Description:
Issue is not present in 6.0(2)A1(x) or 6.0(2)A4(x) and later.

Traffic affected by this issue will match a CoPP class and increment the copp-s-l3destmiss class:

Before:

N3548# sh policy-map interface control-plane

class-map copp-s-l3destmiss (match-any)
police pps 100 , bc 0 packets
HW Matched Packets 0
SW Matched Packets 0


After:

N3548# sh policy-map interface control-plane

class-map copp-s-l3destmiss (match-any)
police pps 100 , bc 0 packets
HW Matched Packets 0
SW Matched Packets 32


Status:
Fixed
Severity:
2 Severe
Last Modified:
12-MAY-2015
Known Affected Releases:
6.0(2)A3(1), 6.0(2)A4(0.787)
Known Fixed Releases:
6.0(2)A4(0.791), 6.0(2)A4(1), 6.0(2)U4(0.791), 6.0(2)U4(1)
Bug Id:
CSCus32535
Title:
n3548 stops processing traffic after upgrade to 6.0(2)A4(3)
Description:

Symptom:
3548 stops processing traffic after upgrade to 6.0(2)A4(3)

Conditions:
This issue is seen when ports on the switch are configured with "speed 1000" but does not have any SFP inserted.

Workaround:
For ports that have no SFP plugged in , ensure the speed is set to auto.
Once this change is done, a reload must be performed to recover.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.0(2)A3(2.55)
Known Fixed Releases:
6.0(2)A4(3.36), 6.0(2)A4(4), 6.0(2)A6(0.13), 6.0(2)A6(0.21), 6.0(2)A6(1), 6.0(2)A6(1.108), 6.0(2)A6(2), 6.0(2)U4(3.36), 6.0(2)U4(4), 6.0(2)U6(0.108)
Bug Id:
CSCuq06284
Title:
Nexus 3172-T interop fixes with 3rd party NIC cards
Description:

Symptom:
Nexus 3172-T base T ports stay down upon reload or link-partner pxe-boot

Conditions:
N3172-T connected to i210AT Intel onboard NIC i210AT on server. or HP DL560G8 Servers.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
6.0(2)U3(1), 6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A3(2.63), 6.0(2)A3(3), 6.0(2)A4(0.834), 6.0(2)A4(0.846), 6.0(2)A4(1), 6.0(2)A6(0.67), 6.0(2)A6(0.73), 6.0(2)A6(1), 6.0(2)U3(2.63), 6.0(2)U3(3)
Bug Id:
CSCua49361
Title:
N3K ABR will not generate Summary LSA
Description:

Symptom:

N3K as OSPF ABR router will not generating type 3 summary LSA.

N3K receives a prefix from connected Router in an Area and will not advertise it into other Area.

This is seen with 5.0(3)U3(2) but NOT seen with 5.0(3)U3(1).

Conditions:

Workaround:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-MAY-2015
Known Affected Releases:
5.0(3)U3(2), 5.0(3)U5(0.306)
Known Fixed Releases:
5.0(3)U3(2b)
Bug Id:
CSCuu35333
Title:
Should not shutdown system when there is PS or FAN direction mismatch
Description:

Symptom:
Donot shutdown system due to fan/PS direction mismatch.

Print Sev1 syslogs every minute instead.

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-MAY-2015
Known Affected Releases:
6.0(2)U3(7.103)
Known Fixed Releases:
Bug Id:
CSCur32090
Title:
N3k - SNMPD crash due to memory leak polling SFP sensor thresholds
Description:

Symptom:
SNMPD crashes due to memory leak while polling CISCO-ENTITY-SENSOR-MIB. Specifically for OID's and indexes collecting SFP thresholds.

Conditions:
Get Requests to collect SFP thresholds using OID's of CISCO-ENTITY-SENSOR-MIB

Workaround:
Do not poll OID's to collect SFP Sensor values and thresholds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-MAY-2015
Known Affected Releases:
6.0(2)U3(0.759), 6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A4(1.25), 6.0(2)A4(2), 6.0(2)A5(0.938), 6.0(2)A5(1), 6.0(2)U3(5.93), 6.0(2)U3(6), 6.0(2)U4(1.25), 6.0(2)U4(2), 6.0(2)U5(0.938), 6.0(2)U5(1)
Bug Id:
CSCuf36771
Title:
N3k-OF:Vlan ID is removed when packets are punted to controller
Description:

Symptom:
When the Datapath Service Set is asked to provide Layer-2 frames to it's client, the frames will be missing any 802.1Q or QinQ header that may have originally been on the frame.

This in turn affects any OpenFlow packets sent to the controller, preventing the controller from properly performing reactive-mode learning switch or similar operations.

Conditions:
When 802.1q tagged packets need to be diverted via the OneP Datapath Service Set to a client, including to an OpenFlow controller by way of the Cisco Plug-in for OpenFlow Agent.

Workaround:
no known workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-MAY-2015
Known Affected Releases:
6.0(2)U3(0.728)
Known Fixed Releases:
6.0(2)A4(1), 6.0(2)U4(1), 7.1(0)ES(0.10), 7.1(0)ES(0.11), 7.1(0)ES(0.13), 7.1(0)ES(0.14), 7.3(0)ZD(0.10), 7.3(0)ZN(0.11)
Bug Id:
CSCue91528
Title:
Device crashes at ARP service crash @arp_adj_timer_callback
Description:

Symptom:
Nexus 3000 device unexpected reload

Conditions:
ARP process crashes and then leads to Nexus 3000 reload.

Workaround:
Unknown at this time

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
5.0(3)U4(1)
Known Fixed Releases:
6.0(2)U1(1)
Bug Id:
CSCuo10155
Title:
msdp hap reset when multicast frames larger than 9208 are received
Description:

Symptom:
An msdp hap reset and core dump may be observed when jumbo frame support and msdp are both configured.

Conditions:
This condition is only possible in when jumbo frames and msdp are configured and multicast frames are received that are greater than or equal to 9209 bytes.

Workaround:
Configure a maximum MTU size that is less than or equal to 9208 bytes.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-MAY-2015
Known Affected Releases:
6.0(2)A1(1c), 6.0(2)A3(1), 6.0(2)U3(0.696)
Known Fixed Releases:
6.0(2)U3(0.711), 6.0(2)U3(1), 7.0(0)BZ(0.46), 7.0(0)HSK(0.317), 7.0(0)KM(0.97), 7.1(0)BF(0.90), 7.1(0)D1(0.171), 7.1(0)FC(0.2), 7.1(0)N1(0.145), 7.1(0)N1(1)
Bug Id:
CSCtx54803
Title:
Specific SNMP GET request causes 'vlan_mgr' to crash on Nexus switches
Description:

Symptoms:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices contain a denial of service vulnerability within the SNMP subsystem. An
authenticated, remote attacker could submit a request to an affected device designed to trigger a null pointer dereference error that results in a crash
and reload of the affected device.

Conditions:
Cisco Nexus 1000v, Nexus 3000, Nexus 5000, and Nexus 7000 devices running an affected version of Cisco NX-OS Software.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/6.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2012-4125 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
5.0(3)U1(2)
Known Fixed Releases:
5.0(3)U3(2)
Bug Id:
CSCut89022
Title:
FR upgrade from FP to ICARIA2 does not get XCVR info
Description:

Symptom:
After fastreload, port goes to 'SFP not Inserted' after FR upgrade from FP to ICARIA2 on 3132*

Conditions:
Fast reload upgrade from 6.0(2)U3*, 6.0(2)U4* to 6.0(2)U5* or 6.0(2)U6*

Workaround:
Do a install-all upgrade.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-MAY-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
6.0(2)U7(0.168), 6.0(2)U7(0.169), 6.0(2)U7(1)
Bug Id:
CSCuq38110
Title:
Multiple Vulnerabilities in OpenSSL - August 2014
Description:

Symptom:
This product includes a version of OpenSSL that could be affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

* Information leak in pretty printing functions (CVE-2014-3508)
* Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
* Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
* Double Free when processing DTLS packets (CVE-2014-3505)
* DTLS memory exhaustion (CVE-2014-3506)
* DTLS memory leak from zero-length fragments (CVE-2014-3507)
* OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
* OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
* SRP buffer overrun (CVE-2014-3512)

This bug has been opened to investigate and address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html


PSIRT Evaluation:
The Cisco PSIRT has assessed these vulnerabilities using the Base and Temporal CVSS scores from the National Vulnerability Database (NVD).

Details about the third-party software vulnerabilities listed above, as well as their CVSS score can be found at the following URL:
http://web.nvd.nist.gov/view/vuln/search

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.0(2)A4(1)
Known Fixed Releases:
6.0(2)A4(1)
Bug Id:
CSCuq38103
Title:
Multiple Vulnerabilities in OpenSSL - August 2014
Description:

Symptom:
This product includes a version of OpenSSL that could be affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

* Information leak in pretty printing functions (CVE-2014-3508)
* Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
* Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
* Double Free when processing DTLS packets (CVE-2014-3505)
* DTLS memory exhaustion (CVE-2014-3506)
* DTLS memory leak from zero-length fragments (CVE-2014-3507)
* OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
* OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
* SRP buffer overrun (CVE-2014-3512)

This bug has been opened to investigate and address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
no feature onep
no feature scp-server
no feature ssh
no feature vmtracker


Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html


PSIRT Evaluation:
The Cisco PSIRT has assessed these vulnerabilities using the Base and Temporal CVSS scores from the National Vulnerability Database (NVD).

Details about the third-party software vulnerabilities listed above, as well as their CVSS score can be found at the following URL:
http://web.nvd.nist.gov/view/vuln/search

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-MAY-2015
Known Affected Releases:
6.0(2)U1(3)
Known Fixed Releases:
6.0(2)A4(0.13), 6.0(2)A4(1), 6.0(2)U4(0.13), 6.0(2)U4(1)
Bug Id:
CSCus68770
Title:
Nexus 3k/3500: assess GHOST vulnerability in glibc (CVE-2015-0235)
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
6.0(2)A4(1), 6.0(2)U5(0.37), 6.0(2)U5(1)
Known Fixed Releases:
6.0(2)A4(3.41), 6.0(2)A4(4), 6.0(2)A5(1.37), 6.0(2)A5(1.38), 6.0(2)A5(1.39), 6.0(2)A5(2), 6.0(2)A6(0.59), 6.0(2)A6(1), 6.0(2)U4(3.41), 6.0(2)U4(4)
Bug Id:
CSCus74195
Title:
Incorrect parity handling for certain tables on T2
Description:

Symptom:
Parity error callbacks on the same index and L2/l3 tables can cause device reloads due to a plog_sup process crash.

Conditions:
Affects only T2 Platforms

Workaround:
1) reload should recover from the condition temporarily.
2) upgrade.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-MAY-2015
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A4(3.41), 6.0(2)A4(3.42), 6.0(2)A4(4), 6.0(2)U4(3.41), 6.0(2)U4(3.42), 6.0(2)U4(4), 6.0(2)U5(1)
Bug Id:
CSCus26875
Title:
December 2014 - NTPd.org Vulnerabilities
Description:

Symptom:
The following Cisco products

Cisco Nexus 3000 Switches

include a version of NTPd that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-9293, CVE-2014-9294, CVE-2014-9295 and CVE-2014-9296

This bug has been opened to address the potential impact on this product.

Please consult http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd for further information.

Conditions:
feature ntp

Workaround:
Block NTP query requests:

ntp access-group query-only query-only-acl

Below shows an example of the NX-OS host being a NTP client:

ntp server 192.168.0.1 use-vrf management
ntp source-interface mgmt0
ntp access-group peer ntp-peer
ntp access-group query-only ntp-query-only
!
ip access-list ntp-peer
statistics per-entry
! Permit the NTP servers you wish to sync with
10 permit udp 192.168.0.1/32 any log
ip access-list ntp-query-only
statistics per-entry
! Deny NTP control messages from any host.
10 deny ip any any log
!

For more information consult: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3000/sw/system_mgmt/6_x/b_3k_System_Mgmt_Config_6_x/b_3k_System_Mgmt_Config_6_x_chapter_010010.html#task_B61435A7608D4FDBAA43AC77C8C0B76D

Further Problem Description:
PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
6.0(2)A4(3.43), 6.0(2)A4(4), 6.0(2)A5(1.38), 6.0(2)A5(2), 6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U4(3.43), 6.0(2)U4(4), 6.0(2)U5(1.38), 6.0(2)U5(2)
Bug Id:
CSCur04934
Title:
Nexus 3000/3500 - Product evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
Symptoms:
The Nexus 3000 and 3500 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187
CVE-2014-6277
CVE-2014-6278

This bug has been opened to address the potential impact on this product.

Conditions:
Conditions:
A user must first successfully log in and authenticate via SSH to trigger this vulnerability.

Workaround:
Workaround:
Not available.

Release with the vulnerability fix:
6.0(2)A3(4), 6.0(2)U3(4) - CCO posted on 10/11

Release expected in future: (Contact Deepak Patwardhan - depatwar for dates)
6.0(2)U2(6)
6.0(2)A4(2), 6.0(2)U4(2)
6.0(2)U5(1) - Nexus3000 only

Further Problem Description:
Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.0(2)U4(1), 7.0(99.1)ZZ, 9.5(1)N1(7.8)
Known Fixed Releases:
5.0(3)U5(0.214), 5.0(3)U5(1j), 6.0(2)A3(3.80), 6.0(2)A3(3.82), 6.0(2)A3(4), 6.0(2)A4(1.21), 6.0(2)A4(2), 6.0(2)A5(0.918), 6.0(2)A5(0.920), 6.0(2)A5(1)
Bug Id:
CSCur28178
Title:
Nexus3000/3500: evaluation of SSLv3 POODLE vulnerability
Description:



Symptom:

This product includes a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

This bug has been opened to address the potential impact on this product.



Conditions:


Web based HTTPS interface is provided in Nexus 3000 only when "feature nxapi" is enabled.
This feature support came in from 6.0(2)U4(1) onwards, and is disabled by default.
When this feature is not enabled, Nexus 3000 is not vulerable.



Workaround:


Disable 'feature nxapi' if enabled.

Will be fixed in following release:

6.0(2)U4(2) - goa MR1



Further Problem Description:



PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A4(1.26), 6.0(2)A4(2), 6.0(2)A5(0.946), 6.0(2)A5(0.947), 6.0(2)A5(1), 6.0(2)U4(1.26), 6.0(2)U4(2), 6.0(2)U5(0.946), 6.0(2)U5(0.947), 6.0(2)U5(1)
Bug Id:
CSCuu06246
Title:
Nexus 3K: vulnerability related to cmd injection via DHCP offer options
Description:

Symptom:
Command injection via DHCP offer options used with PowerOn Auto Provisioning (POAP)




Conditions:
NX-OS Switch would have to be in a state where POAP is initiated, and if an attacker can either:

A) Inject their own DHCP server and respond to the POAP DHCP request with
crafted DHCP options.

B) Compromise an existing DHCP server, and craft the specific DHCP
options.

Then during the POAP process, when the crafted DHCP options are processed
arbitrary commands on the system could be executed in the context of root
user.

Note this issue only occurs during the POAP DHCP boot process.

Workaround:

Further Problem Description:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dis
patch=1&version=2&vector=AV:A/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

CVE ID CVE-2015-0658 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
5.0(3)U5(1h), 6.0(2)U4(1), 6.0(2)U5(1)
Known Fixed Releases:
Bug Id:
CSCut77415
Title:
APRIL 2015 NTPd Vulnerabilities
Description:

Symptom:
This product includes a version of ntpd that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798 and CVE-2015-1799

This bug has been opened to address the potential impact on this product.

Conditions:
Device configured with NTP and NTP Keys

All shipping versions affected.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
6.0(2)A7(0.163), 6.0(2)A7(1), 6.0(2)U7(0.163), 6.0(2)U7(1)
Bug Id:
CSCur05529
Title:
Nexus 3000/3500 evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
The Cisco Nexus 3000/3500 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.

Conditions:
A user must first successfully log in and authenticate via SSH to trigger this vulnerability.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
24-MAY-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A3(3.80), 6.0(2)A3(4), 6.0(2)A5(0.918), 6.0(2)A5(1), 6.0(2)U3(3.80), 6.0(2)U3(4), 6.0(2)U5(0.918), 6.0(2)U5(1)
Bug Id:
CSCut87006
Title:
Crash in n3500 netstack library when running with NDB embedded
Description:

Symptom:
After some time of normal operation, Nexus Data Broker (NDB) is suddenly no longer reachable
through the GUI.
Openflow switches using the underlying XNC as controller report a connection failure to the
controller, e.g.

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: no response to
inactivity probe after 5 seconds, disconnecting

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: connection failed
(Connection reset by peer)

Conditions:
This has been observed on NDB 2.0 running embedded on a Nexus 3548 running NXOS 6.0(2)A6(1)
It is not confirmed at this time whether or not other versions or other platforms are affected.

Workaround:
Restart the NDB service:
conf t
onep
virtual-service ofa_ndb
no activate
activate
exit

Further Problem Description:
This defect only affects the working of the controller and the NDB application, it does not
affect the flows created by the controller, except flows that were created but not saved.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.0(2)A6(1)
Known Fixed Releases:
6.0(2)A4(5.50), 6.0(2)A4(6), 6.0(2)A6(2.25), 6.0(2)A6(3), 6.0(2)A7(0.172), 6.0(2)A7(1), 6.0(2)U4(4.50), 6.0(2)U4(5), 6.0(2)U6(1.25), 6.0(2)U6(2)
Bug Id:
CSCut64829
Title:
packets greater than 361B egressing 1G link on 3548 have CRC errors
Description:

Symptom:
If packet size is more than 361 bytes and it goes out of an 1G link of Nexus 3548, we will hit CRC errors on peer switch. Due to CRC errors packet loss can happen.

Conditions:
Packet loss occurs.

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
25-MAY-2015
Known Affected Releases:
6.0(2)A6(1)
Known Fixed Releases:
6.0(2)A6(1.13), 6.0(2)A6(2), 6.0(2)U6(0.13), 6.0(2)U6(1)
Bug Id:
CSCuu18724
Title:
N3k MTS memory leak caused snmpd process to crashes multiple times
Description:

Symptom:
snmpd process crashes

2015 Apr 29 15:00:33.104 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904027] mts_is_q_space_available_haslock_old():2013: regular+fast mesg total = 46388, soft limit = 1024 - kernel
2015 Apr 29 15:00:33.106 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904034] mts_is_q_space_available_haslock_old(): NO SPACE - node=4, sap=27, uuid=26, pid=19086, sap_opt = 0x1, hdr_opt = 0x0, rq=46388(27966872), lq=0(0), pq=0(0), nq=0(0), sq=0(0), fast: rq=0, lq=0, pq=0, nq=0, sq=0 - kernel
2015 Apr 29 15:00:33.108 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904040] mts_print_longest_queue_state: opcode counts for first and last 50 messages in recv_q of sap 27: - kernel
2015 Apr 29 15:00:33.111 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904048] mts_print_msg_opcode_in_queue: opcode 2832 - 100 messages - kernel
2015 Apr 29 15:00:33.113 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904051] mts_do_msg_input() failing since no space available in 27 (src_sap = 27, opc = 325) - kernel
2015 Apr 29 15:00:52.241 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:52 %KERN-2-SYSTEM_MSG: [538346.023794] [sap 27][pid 19086][comm:snmpd] QFULL drop notify posted - kernel
2015 Apr 29 15:00:52.244 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:52 %KERN-2-SYSTEM_MSG: [538346.031952] [sap 27][pid 19086][comm:snmpd] sap recovering failed and so Killed - kernel
2015 Apr 29 15:00:53.034 nttcom-tyo4 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 19086) hasn't caught signal 6 (core will be saved).
2015 Apr 29 15:03:53.855 nttcom-tyo4 %$ VDC-1 %$ %SYSMGR-2-CORE_SAVE_FAILED: core_client_main: PID 24943 with message command /isan/bin/sysmgr_logmgr /var/sysmgr/tmp_logs 0 1>> /var/sysmgr/core_handling.log failed for srv , ret = 2 .
nttcom-tyo4#

Conditions:
normal operation

Workaround:
unknown at this point

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
Bug Id:
CSCuu14529
Title:
VxLAN: NVE peering may fail on N3132Q
Description:

Symptom:
VxLAN session in between N3K-C3132Q and other VxLAN capable platforms may not come up.

When problem happens, NVE peering is not established and no remote MAC addresses learned by the chassis:

Nexus3132Q# show nve vni
Interface VNI Multicast-group VNI State
---------------- -------- --------------- ---------
nve1 10000 239.0.0.1 Up
nve1 20000 239.0.0.2 Up

Nexus3132Q# show nve peers


Conditions:
Issue observed on N3K-C3132Q platform.

Workaround:
Under certain conditions ingress replication can be used to workaround this problem. Since ingress replication limits NVE peering to single per VNI session, this may not be suitable for all scenarios.

Further Problem Description:
This is a compatibility issue between the nexus 3000 and nexus 5000 with vxlan configuration because of the difference in implementation of the feature. Nexus 5000 requires PIM bidir while Nexus 3000 uses PIM SM

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.0(2)U3(7.99)
Known Fixed Releases:
Bug Id:
CSCuu28210
Title:
memory leak in PIM SLAB
Description:

Symptom:
On a Nexus 3500 switch multicast traffic might stop forwarding for specific groups/sources.

Conditions:
The following messages are seen in the syslog:
%PIM-3-SLAB_ALLOC: pim [3665] Slab alloc of type pim_routetype failed in pim_build_pim_route()
%PIM-3-CREATE_ROUTE: pim [3665] Couldn't create PIM route for (A.B.C.D/32, E.F.G.H/32) in pim_add_oif_to_sources_walk()

Also, memory allocation for PIM can be seen increasing using the following command:
show ip pim internal mem-stats detail | grep -i "grand total"

Workaround:
Reload the device to clear the memory allocation.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
6.0(2)A3(2.55)
Known Fixed Releases:
Bug Id:
CSCue43983
Title:
N3K not classifying PIM-REG under CoPP
Description:

<B>Symptom:</B>

High CPU on Nexus 3000 due to unicast PIM_REG messages being incorrectly classified under the
CoPP policy.


class-map copp-s-routingProto1 (match-any)
match access-grp name copp-system-acl-routingproto1
match access-grp name copp-system-acl-v6routingproto1
police pps 1000
OutPackets 28067449
DropPackets 29883650

class-map copp-s-pimreg (match-any)
match access-grp name copp-system-acl-pimreg
police pps 200
OutPackets 0
DropPackets 0
class-map copp-s-pimautorp (match-any)
police pps 200
OutPackets 0
DropPackets 0




<B>Workaround:</B>

Ideally the RP should send a register stop and stop he PIM-REG process. For any reason if RP has
been mis-configured you can use a VACL to drop these PIM-REG packets in hardware.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-MAY-2015
Known Affected Releases:
5.0(3)U5(1b)
Known Fixed Releases:
5.0(3)U5(1c), 6.0(2)A1(1), 6.0(2)U1(1)
Bug Id:
CSCtu10593
Title:
CDP with long address crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Symptom:
wrongly moved to M-moving back to R & V.

Bhavesh

Conditions:
wrongly moved to M-moving back to R & V.

Bhavesh

Workaround:
wrongly moved to M-moving back to R & V.

Bhavesh

Further Problem Description:
wrongly moved to M-moving back to R & V.

Bhavesh

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(1)
Known Fixed Releases:
5.0(3)U3(1)
Bug Id:
CSCtu10603
Title:
CDP with long protocol crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(1)
Known Fixed Releases:
5.0(3)U3(1)
Bug Id:
CSCtx66070
Title:
CDP crashes when receiving malformed packet
Description:

Symptom:
Cisco Nexus 1000, 3000, 4000, 5000, and 7000 switches as well as Cisco Unified Computing System Fabric Interconnect devices may restart after receiving malformed Cisco Discovery Protocol (CDP) Packets. An adjacent attacker, with the ability to submit malformed CDP traffic to an affected device could cause a denial of service condition while the device reloads or fails over to a redundant Supervisor card if so equipped.

Conditions:
Cisco Nexus Switches running an affected version of NX-OS.
Cisco Unified Computing System, Fabric Interconnect devices running an affected version of UCS Software.

Workaround:
Disable CDP on the affecte device, the CDP protocol is enabled by default.

NX-OS:
no cdp enable

UCS:
Add the 'disable cdp' command to all Network Control Policies

Further Problem Description:
This issue was identified through internal hardening efforts on the NX-OS platform.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-1322 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(1), 5.0(3)U4(1)
Known Fixed Releases:
5.0(3)U3(1)
Bug Id:
CSCtu10554
Title:
CDP with long sysobj crashes process
Description:

Summary

Cisco Nexus, Cisco Unified Computing Systemn (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers
(CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities:

* Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products
* Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability
* Cisco NX-OS Software SNMP Buffer Overflow Vulnerability
* Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability

Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2013-1181 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(1)
Known Fixed Releases:
5.0(3)U3(1)
Bug Id:
CSCtr10146
Title:
N3K - ospfv2 memory leak when receiving specific malformed packets
Description:

Symptoms:
OSPF process leaks memory when receiving specially-crafted packet

Conditions:
This issue may occur when the switch processes a malformed packet.

Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2011-2539 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U1(1d)
Known Fixed Releases:
5.0(3)U1(2)
Bug Id:
CSCua68258
Title:
SYSRET 64-bit operating system privilege escalation
Description:

Symptoms:
On June 12, 2012, US CERT published VU 649219 addressing a local privilege escalation vulnerability in several 64-bit operating systems and virtualization software running on Intel CPU hardware. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.

Link to VU: http://www.kb.cert.org/vuls/id/649219

Intel claims that this vulnerability is a software implementation issue, as their processors are functioning as per their documented specifications. However, software that fails to take the Intel-specific SYSRET behavior into account may be vulnerable.

CVE-2012-0217 and CVE-2006-0744 have been issued to document this issue in the industry.

This bug has been filed to investigate and track this issue in this product.

Conditions:
This issue has not been confirmed to be exploitable in this product. However, this is a locally exploitable vulnerability and a valid user must be authenticated before he/she can exploit this issue.

Workaround:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.6/6.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:F/RL:U/RC:C

CVE IDs CVE-2012-0217 and CVE-2006-0744 havebeen assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Terminated
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
9.5(1)N1(7.8)
Known Fixed Releases:
Bug Id:
CSCuc19569
Title:
RADIUS insufficient attribute length check
Description:

Symptoms:
Cisco NXOS contains a vulnerability in the RADIUS authentication code.
Conditions:
Malformed packets are returned from a RADIUS authentication server.
Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-6377 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(2c)
Known Fixed Releases:
6.0(2)A1(1), 6.0(2)U1(1)
Bug Id:
CSCug38697
Title:
OSPF LSA Injection Vulnerability
Description:

Summary
Multiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA)
database. This vulnerability could allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table,
blackhole traffic, and intercept traffic.

The attacker could trigger this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause flushing of the routing table on a
targeted router, as well as propagation of the crafted OSPF LSA type 1 update throughout the OSPF AS domain.

To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability
can only be triggered by sending crafted unicast or multicast LSA type 1 packets. No other LSA type packets can trigger this vulnerability.

OSPFv3 is not affected by this vulnerability. Fabric Shortest Path First (FSPF) protocol is not affected by this vulnerability.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This
advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
5.8/5.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:U/RC:C
CVE ID CVE-2013-0149 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Symptom:
Invalid LSA in Database

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)U2(1), 6.2(0)PF(0.155)
Known Fixed Releases:
5.2(1)N1(6)
Bug Id:
CSCtr61490
Title:
ACL leak if "remark" is added to ACL
Description:

Summary
A vulnerability exists in Cisco Nexus 5000 and 3000 Series Switches that may allow traffic to bypass deny statements in access control lists
(ACLs) that are configured on the device.

Cisco has released free software updates that address this vulnerability.

A workaround is available to mitigate this vulnerability.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20110907-nexus.shtml

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2011-2581 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
5.0(3)U2(1)
Known Fixed Releases:
5.0(3)U1(2a)
Bug Id:
CSCun43042
Title:
Sudoers file needs review for dangerous entries
Description:

Symptoms:
Cisco NX-OS based devices should be hardened against local attacks even when such access is not designed into the product. This defect documents the need to review the
local sudoers file and remove or modify any potentially dangerous entries. This will help hardened the general defensive posture of the product.

Conditions:
Devices running Cisco NX-OS.

Workaround:
None.

Further Problem Description:
This is a proactive hardening defect to improved the overall security posture of the Nexus Product lines.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)U2(2.41), 6.0(2)U2(3), 6.0(2)U3(0.658), 6.0(2)U3(1), 6.0(2)U4(0.60), 6.0(2)U4(1)
Bug Id:
CSCut43397
Title:
Nexus 3000 and 3500 (N3K and N3500K) Leap Second
Description:

Symptom:
When the leap second update occurs a N3K could have the kernel hit what is known a "livelock" condition under the following circumstances:

a. When the NTP server pushes the update to the N3K NTPd client, which in turn schedules the update to
the Kernel. This push should have happened 24 hours before June 30th, by most NTP servers.

b. When the NTP server actually updates the clock

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
On switches running affected code, following workaround can be used.

1)Remove NTP/PTP configuration on the switch at least two days prior to June 30, 2015 Leap second event date.
2)Add NTP/PTP configuration back on the switch after the Leap second event date(July 1, 2015)

Further Problem Description:
The following releases and above are not affected by this issue:

6.0(2)U3(1)
6.0(2)U2(2Z)
6.0(2)U2(1)
6.0(2)U1(1)
6.0(2)A1(1b)

- The last leap second update happened on June 30th @ 23:59:60 UTC.

- The next leap second update is not due until next several years, and 6 months notice will be given before the update. Please see URL below for leap second update details.

Reference : http://www.timeanddate.com/time/leapseconds.html

- Now that we have past June 30th 23:59:60 UTC, if your N3K have not reset or switched over, you are not affected this caveat until the next leap second update.

Status:
Other
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)U1(1)
Known Fixed Releases:
6.0(2)A1(2d), 6.0(2)U2(1), 6.0(2)U2(2Z), 6.0(2)U3(1)
Bug Id:
CSCur83153
Title:
NDB may stop working unexpectedly
Description:

Symptom:
After some time of normal operation, Nexus Data Broker (NDB) is suddenly no longer reachable
through the GUI.

Openflow switches using the underlying XNC as controller report a connection failure to the
controller, e.g.

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: no response to
inactivity probe after 5 seconds, disconnecting

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: connection failed
(Connection reset by peer)

Conditions:
This has been observed on NDB 2.0 running embedded on a Nexus 3548 running NXOS 6.0(2)A4(1)
It is not confirmed at this time whether or not other versions or other platforms are affected.

Workaround:
Restart the NDB service:
conf t
onep
virtual-service ofa_ndb
no activate
activate
exit

Please note: unsaved changes in NDB will be lost.

Further Problem Description:
This defect only affects the working of the controller and the NDB application, it does not
affect the flows created by the controller, except flows that were created but not saved.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:TF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-MAY-2015
Known Affected Releases:
6.0(2)U4(0.41)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(6), 6.0(2)A6(0.17), 6.0(2)A6(1), 6.0(2)U4(4.47), 6.0(2)U4(5), 6.0(2)U6(0.17), 6.0(2)U6(1), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357)
Bug Id:
CSCuu14304
Title:
Not sending packets after being changed transceiver from 1G to 10G
Description:

Symptom:
After being changed transceiver from 1G to 10G, N3548(X) don't send any packet.

Conditions:
Swapping the transceivers from 1000base-SX to 10Gbase-SR

Workaround:
Rebooting the device.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-MAY-2015
Known Affected Releases:
6.0(2)A6(1)
Known Fixed Releases:
6.0(2)A4(5.51), 6.0(2)A4(6), 6.0(2)A6(2.26), 6.0(2)A6(3), 6.0(2)U4(4.51), 6.0(2)U4(5), 6.0(2)U6(1.26), 6.0(2)U6(2)
Bug Id:
CSCuu54126
Title:
10g SFP not working/detected on Nexus 3K in port E1/1
Description:

Symptom:
- 10g SFP not working/detected on Nexus 3K in port E1/1 and same SFP works on other switch ports

Conditions:
- issue found in code : 6.0(2)U2(6)
- Interface status remains down

etaccsw17.wsf.prnynj# sho int ethernet 1/1

Ethernet1/1 is down (Link not connected)

Dedicated Interface

Hardware: 100/1000/10000 Ethernet, address: 885a.9237.2228 (bia 885a.9237.2228)

Description: [CISCO][WIFI][OUTDOOR] wc101.wsf.prnynj [8510] PORT 02

MTU 1500 bytes, BW 10000000 Kbit, DLY 10 usec

reliability 255/255, txload 1/255, rxload 1/255

- Transceiver status show present

sdeaccsw17.wsf.prnynj# sho int ethernet 1/1 transceiver details

Ethernet1/1

transceiver is present >>>>

type is 10Gbase-LR

name is CISCO-FINISAR

part number is FTLX1474D3BCL-CS

- bcm_shell status of interface shows no error only stp in blocking state which seems to be expected behavior as interface is down.
bcm-shell.0> port 1

PORT: Status (* indicates PHY link up)

*xe0 LS(SW) Forced(10GFD) STP(Block) Lrn(ARL,FWD) UtPri(0) Pfm(FloodNone) IF(SFI) Max_frame(1518) MDIX(ForcedNormal, Normal) Medium(Copper) VLANFILTER(3)

Workaround:
Reload the switch

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.0(2)U2(5.87)
Known Fixed Releases:
Bug Id:
CSCut78781
Title:
N3000 does not install pim OIL for (S,G)
Description:

Symptom:
Missing PIM derived OIL for some (S,G)-s when multiple sources come online at the same time

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-MAY-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A7(0.167), 6.0(2)A7(1), 6.0(2)U7(0.167), 6.0(2)U7(1)
Bug Id:
CSCut86141
Title:
SFP-H10GB-CU2.255M, hardware type changed to No-Transceiver on N3k
Description:

Symptom:
SFP not detected on the ports. The same SFP works on other ports

Conditions:
interface remain down with following error
%ETHPORT-5-IF_HARDWARE: Interface Ethernet1/30, hardware type changed to No-Transceiver

in the bcm_shell interface shows FAUTL remote

bcm-shell.0> port 8
PORT: Status (* indicates PHY link up)
xe7 LS(SW) Forced(10GFD) STP(Disable) Lrn(ARL,FWD) UtPri(0) Pfm(FloodNone) IF(SFI) Max_frame(1518) MDIX(ForcedNormal, Normal) Medium(Copper) Fault(Remote) VLANFILTER(3)

Workaround:
power drain of the switch seems to be recovering the issue some times

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.0(2)U5(0.37)
Known Fixed Releases:
Bug Id:
CSCut97806
Title:
1G link not up in QI2-CR with autoneg enabled.
Description:

Symptom:
1G ports does not link up between Nexus 3172PQ and other peers

Conditions:
When Nexus 3172 is configured in 48x10G+6x40G portmode

Workaround:
Two options:
a) Configure portmode as 48x10g+breakout6x40g. In this mode, 1G ports does not have this issue. Also the last QSFP ports will work in 40G mode.
b) Disable auto-negotiation (AN) on the affected interface using "no negotiate auto" in interface configuration mode. Note that this command will fail while the interface is assigned to a port-channel. Procedure in this case is to first remove the "channel-group" command, then add the "no negotiate auto" and then re-apply the "channel-group".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-MAY-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
6.0(2)A6(2.35), 6.0(2)A6(3), 6.0(2)U6(1.35), 6.0(2)U6(2)
Bug Id:
CSCus89127
Title:
Disabling ptp on one interface breaks ptp on many other interfaces.
Description:

Symptom:
When a change performed on one of the interfaces on N3K, which affects PTP on this interface, it may affect PTP on other interfaces on this switch.

Conditions:
PTP enabled on interfaces

Workaround:
restart PTP on other affected interfaces by:
no ptp
ptp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-MAY-2015
Known Affected Releases:
6.0(2)A3(1), 6.0(2)A4(3), 6.0(2)A6(0.77)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(5.53), 6.0(2)A4(6), 6.0(2)A6(0.80), 6.0(2)A6(1), 6.0(2)A6(2.28), 6.0(2)A6(3), 6.0(2)U4(4.47), 6.0(2)U4(4.53), 6.0(2)U4(5)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论