Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -Cisco 3900 Series Router-01-Jul-2015 16:48 GMT

 

 

 

 

 

 

 


Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c3900e-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c3900e-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925E Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c3900e-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c3900e-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945E Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c3900-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c3900-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c3900-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c3900-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Known Bugs - 3900 Series Integrated Services Routers

Bug Id:
CSCty42626
Title:
RSA operations fail with '(malloc) at interrupt level' msg
Description:

Symptom:
Certificate enrollment fails for some of the Cisco routers due to
digital signature failure.

Conditions:
This symptom was initially observed when the Cisco 3945 router or
the Cisco 3945E router enrolls and requests certificates from a CA server.

This issue potentially impacts those platforms with HW crypto engine. Affected
platforms include (this is not a complete/exhaustive list)

c3925E, c3945E
c2951, c3925, c3945
c7200/VAM2+/VSA,
possibly VPNSPA on c7600/cat6K
819H
ISR G2 routers with ISM IPSec VPN accelerator

The issue is also seen on GetVPN Key Servers during the rekey process.

The issue can also be observed during the RSA key generation process on the router.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
15.1(4)M3.10
Known Fixed Releases:
15.0(1)M10, 15.0(1)M8.18, 15.0(1)M9, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EX, 15.0(2)EX1, 15.0(2)EX3, 15.0(2)EX4, 15.0(2)EX5
Bug Id:
CSCut62573
Title:
Delay in ip sla start-time day by day
Description:

Symptom:
Delay will happen on ip sla start-time day by day

Conditions:
1. The router is sync to a NTP server
2. ip sla is configured with another router
3. ip sla start-time is set

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
15.3(3)M4.2
Known Fixed Releases:
Bug Id:
CSCty80850
Title:
Layer 2 not coming up and SABME not being detected.
Description:

Symptom:
3925 Gateway(VWIC-2MFT-E1/T1)---PRI---TELCO Switch.
Gateway sending SABME to TELCO, and TELCO replies to it. Replies not detected by the Controller.
Same behaviour with software loopback test and hardware loopback test. Atleast in Software loopback test using (loopback diag), the gateway should see the same SABME(sent by the controller) coming back to it.
ISDN status toggling between in "Awaiting Establishment" and "TEI_ASSIGNED".

Conditions:
Found in customer environment.
Intermittent.
3925 Router
IOS : c3900-universalk9-mz.SPA.151-4.M1.bin

Workaround:
Reload fixes the issue.

Status:
Terminated
Severity:
2 Severe
Last Modified:
06-JUN-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCtj79480
Title:
High CPU due to interrupts in time_it
Description:

Symptom:
High CPU usage due to time_it (in interrupts).

Conditions:
The conditions are undetermined at this time.

Workaround:
Reload the router and the CPU goes down for certain time.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.1(1)T1
Known Fixed Releases:
Bug Id:
CSCut34058
Title:
Memory Fragment on SM-X-1T3/E3= with Serial Background process
Description:

Symptom:
The following memory log start to appear again and again:

035167: Feb 17 10:01:13.316 CST: %SYS-2-MALLOCFAIL: Memory allocation of 10060 bytes failed from 0x358708, alignment 32
Pool: I/O Free: 1642352 Cause: Memory fragmentation
Alternate Pool: None Free: 0 Cause: No Alternate pool
-Process= "Serial Background", ipl= 4, pid= 43
-Traceback= 19E5889z 31B9D78z 31B9529z 358708z 354B50z 358D24z 36385Cz 3637D9z 2EFF3A3z


The process consuming the memory is Serial Background

After the decode of the traceback we noticed that the card "SM-X-1T3/E3=" appears on it:

0x36385C:__be_sm_1t3e3_serial_set_idle_character_mode(0x3637f4)+0x68
0x3637D9:__be_sm_1t3e3_serial_reset_wrapper(0x3637ba)+0x1f

Conditions:
The device must have the SM-X-1T3/E3= card.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
Bug Id:
CSCus30128
Title:
RRI dynamic L2L after client change ip address Ipsec rekey lost routes
Description:

Symptom:
Dynamic L2L IPsec VPN , client used PPPOE to connect to internet.
When the client PPPOE disconnect and got the new ip address .
In the hub when the old address SPI lifetime reached and delete it will delete the RRI route.
When the new SPI lifetime reached , IPsec rekey the RRI route be added and then very quickly be delete.

Conditions:
The issue is happened when remote router change the ip address , but in the hub still have the old SPI information.

Workaround:
Manually add an static route for the RRI entry.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.2(4)M6.1
Known Fixed Releases:
15.3(3)S5.16, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)SN1, 15.5(1)T1, 15.5(2)S0.8, 15.5(2.14)S, 15.5(2.23)T
Bug Id:
CSCtz22112
Title:
VXML gateway crash when trying to access a URL.
Description:

Symptoms: A VXML gateway may crash while parsing through an HTTP packet that
contains the "HttpOnly" field:

//324809//HTTPC:/httpc_cookie_parse: * cookie_tag=' HttpOnly'
//324809//HTTPC:/httpc_cookie_parse: ignore unknown attribute: HttpOnly

Unexpected exception to CPU: vector D, PC = 0x41357F8

Note: The above log was captured with "debug http client all" enabled to
generate additional debugging output relevant to HTTP packet handling.

Conditions: The symptom is observed when an HTTP packet with the "HttpOnly"
field set is received.

Workaround: There is no workaround.



Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.1(3.22)T
Known Fixed Releases:
15.1(4)M5.14, 15.1(4)M6, 15.1(4)M7, 15.1(4)M8, 15.1(4)M9, 15.2(2.19)S0.7, 15.2(3.16)T, 15.2(3.30)PIP, 15.2(4)GC, 15.2(4)GC1
Bug Id:
CSCtq23960
Title:
ISR series routers using PPC or MIPS arch crash & gen empty crash files
Description:

Symptoms: A Cisco ISRG2 3900 series platform using PPC architecture crashes and
generates empty crashinfo files:

show flash: all

-#- --length-- -----date/time------ path
<>
2 0 Mar 13 2011 09:40:36 crashinfo_
3 0 Mar 13 2011 12:35:56 crashinfo_
4 0 Mar 17 2011 16:14:04 crashinfo_
5 0 Mar 21 2011 05:50:58 crashinfo_

Conditions: The symptom is observed with a Cisco ISRG2 3900 series platform
using PPC architecture.

Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
15.0(1)M5, 15.0(1)S5.1, 15.1(2)T2
Known Fixed Releases:
15.1(4)M5.18, 15.1(4)M6, 15.1(4)M7, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M2.5
Bug Id:
CSCud82278
Title:
DNLD: flex_dnld_dsp_msg_proc unexpected event 0, expected 1 received ons
Description:

Symptom:
DNLD: flex_dnld_dsp_msg_proc unexpected event 0, expected 1 received ons
Conditions:
Though there is no ipsla configuration just with the presence of PVDM3-256 the error is spewed out and the cpu hit 99% dropping traffic.

*Dec 20 19:51:16.303: DNLD: flex_dnld_dsp_msg_proc unexpected event 0, expected 1 received onslot 0 dsp 0 state 2
*Dec 20 19:51:16.303: pak len 20 0 14 0 0 0 82 0 0 0 0 0 21 0 1 0 0 0 2E 0 80
*Dec 20 19:51:16.303:

Workaround:
NA

Status:
Terminated
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.3(1.10)T, 15.3(1.4)T
Known Fixed Releases:
Bug Id:
CSCtq78217
Title:
ISRG2: Router reloads due to Segv exception process: CCSIP_SPI_CONTROL
Description:

Symptoms: A router crashes with the following information:

System returned to ROM by address error at PC 0xZZZZZZZZ, address 0xZZZZZZZZ

Conditions: The symptom is observed with CUBE + SIP.

Workaround: There is no workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.1(3)T
Known Fixed Releases:
15.1(2)T5, 15.1(3)T3.1, 15.1(3)T4, 15.1(4)GC1, 15.1(4)GC2, 15.1(4)M1.6, 15.1(4)M2, 15.1(4)M3, 15.1(4)M4, 15.1(4)M5
Bug Id:
CSCut11714
Title:
Router crash on defaulting interface with CFM configuration
Description:

Symptom:
AIS condition not successfully cleared on UUT Router

Conditions:
AIS condition not successfully cleared on UUT Router for the version 15.5(2.3)T

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
15.5(1.23)T, 15.5(1.23)T0.2
Known Fixed Releases:
15.5(1.23)T0.6, 15.5(2)T, 15.5(2.7)T
Bug Id:
CSCuu82082
Title:
Memory corruption crash due to cont_scan_display_session
Description:

Symptom:
We see a lot of '%AP-1-AUTH_PROXY_AUTH_FAILURES_EXCEEDED' logs prior to the crash.
Not sure if they are related for now.

Conditions:
The crash is observed after the following CLI 'sh cws sess active ip-addr all' was executed.
However the crash is not consistently seen with the above CLI.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
15.4(3)M1
Known Fixed Releases:
Bug Id:
CSCut85312
Title:
H245 accessing free chunk
Description:

Symptom:
Hw sw
c3900-universalk9-mz.SPA.152-4.M7.bin
CISCO3925

Conditions:
None

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
15.2(4)M7.1
Known Fixed Releases:
Bug Id:
CSCuo00091
Title:
ISM: No Packets encrypted: IP PKT Exception increasing
Description:

Symptom:
ISM does not encrypt data (encaps counter is 0 in "show crypto ipsec sa")
Issue is seen in post 15.2(4)M5.4 (including M6) versions.

Conditions:
ISM is used.

Workaround:
Use oboard crypto

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
Bug Id:
CSCus56153
Title:
Crash with MSRPC trf @ Firewall State,CCE dp policy feature object chunk
Description:

Symptom:
IOS crash @CCE dp policy f

Conditions:
na

Workaround:
none at the moment

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
Bug Id:
CSCto48060
Title:
Router crashed by Unexpected exception to CPU: vector 1400
Description:

Symptoms: A Cisco 3900 series router may crash with the following error:

Unexpected exception to CPU: vector 1400

Conditions: The symptom is observed when the router is configured as a voice
gateway using H323 and H245 and connected to CUCM. If CUCM is sending a
MultiMediaSystemControl messages with no entry, the router may crash.

Workaround: There is no workaround.



Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
15.1(1)T
Known Fixed Releases:
15.1(3)T2.3, 15.1(3)T3, 15.1(3)T4, 15.1(4)GC1, 15.1(4)GC2, 15.1(4)M1.4, 15.1(4)M2, 15.1(4)M3, 15.1(4)M4, 15.1(4)M5
Bug Id:
CSCuj23293
Title:
Memory leak in CCSIP_UDP_SOCKET
Description:

<B>Symptom:</B>
A memory leak is seen in the MALLOCLITE process:

show processes memory ------------------
Processor Pool Total: 282793968 Used: 280754252 Free: 2039716
I/O Pool Total: 41943040 Used: 18560544 Free: 23382496

PID TTY Allocated Freed Holding Getbufs Retbufs Process
0 0 268189264 170950536 88785564 1354 634324 *Init*
0 0 0 0 141933756 0 0 *MallocLite*
409 0 451333208 202702788 40928844 83639 83639 CCSIP_UDP_SOCKET
299003084 Total
The memory continues to increase there.

<B>Conditions:</B>
This symptom is observed while parsing to header, Gateway gets errors as below:

Feb 26 12:07:28 EST: Parse Error: url_parseSipUrl: Received Bad Port
Feb 26 12:07:28 EST: //2765/000000000000/SIP/Error/sippmh_cmp_tags: Parse Error in request header

The correct response for the above should have been to send
400 Bad Request The request cannot be fulfilled due to bad syntax

The memory associated with the above is not getting released is the side effect of the above.

<B>Workaround:</B>
There is no workaround.

<B>Further Problem Description:</B>
This issue was not seen on versions earlier than 15.3X

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.3(1)T1.1, 15.3(2)T1.2
Known Fixed Releases:
15.3(3)M2.4, 15.3(3)M3, 15.3(3)M4, 15.3(3)S2.8, 15.3(3)S3, 15.3(3)S4, 15.4(1)S2.2, 15.4(1)S3, 15.4(1)T1.2, 15.4(1)T2
Bug Id:
CSCui79745
Title:
Crash @ crypto_engine_packet_callback in IPSEC on ISR Codenomicon
Description:

Symptom:
A vulnerability in IPSec processing of Cisco IOS Software could allow an authenticated, remote attacker to cause a reload of the affected device.

The vulnerability is due to improper processing of malformed IPSec packets. An attacker could exploit this vulnerability by sending malformed IPSec
packets to be processed by an affected device. An exploit could allow the attacker to cause a cause a reload of the affected device.


Conditions:
Cisco IOS device receiving malformed IPSec packets over an established IPSec SA, may crash.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3299 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3299

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
15.4(0.12)T
Known Fixed Releases:
15.2(1)SY1.13, 15.2(2)E, 15.2(2.2.73)ST, 15.2(2.2.93)EA, 15.2(2.3)PSR, 15.2(2.39)PSR, 15.2(2b)E, 15.2(3)E, 15.3(2)T4, 15.3(3)M3.2
Bug Id:
CSCur07571
Title:
Processor memory leak with MRCP_Client at cc_api_get_call_active_entry
Description:

Symptom:
A VXML gateway router will see a memory leak with MRCP_CLIENT in processor memory. In some cases this can lead to the gateway crashing.

Conditions:
Seen with MRCPv1

Workaround:
Not seen MRCPv2

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
19-JUN-2015
Known Affected Releases:
15.3(3)M3
Known Fixed Releases:
15.3(3)M4.1, 15.3(3)M5, 15.3(3)S4.5, 15.3(3)S5, 15.4(1)S2.22, 15.4(1)S3, 15.4(1)T2.2, 15.4(1)T3, 15.4(2)S2.15, 15.4(2)S3
Bug Id:
CSCuq15237
Title:
GM hangs while applying show crypto gdoi command
Description:

Symptom:
GM2 hangs after applying the command "show crypto gdoi | inc (POLICY|spi|remaining)"

Conditions:
This is seen in IPv6 IPSec scenarios.

Workaround:
Unknown

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
19-JUN-2015
Known Affected Releases:
15.5(0.10)T, 15.5(0.11)T
Known Fixed Releases:
15.0(2)EA, 15.0(2)EB, 15.0(2)EC, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EK, 15.0(2)EK1, 15.0(2)EX
Bug Id:
CSCue20991
Title:
3900 / MPLS MTU override does not work
Description:

Symptom:
1) The "mpls mtu override" option does not work on the Cisco c3900. Packets are
dropped with the "%LINK-4-TOOBIG:" error.
2) The packet size printed in the "%LINK-4-TOOBIG:" error is wrong; it is
printing wrong parameter instead of the datagram size.
3) max_pak_size considered is 1518 even in the case of interface drivers
supporting up to 9576.

Conditions:
This symptom is observed with the Cisco c3900 running Cisco IOS Release 15.1(4)M.

Workaround:
Match MPLS MTU exactly with the interface MTU.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.1(4)M
Known Fixed Releases:
15.1(4)M8, 15.1(4)M9, 15.3(3)M2.3, 15.3(3)M3, 15.3(3)M4, 15.4(1.7)T, 15.4(2)CG, 15.4(2)T, 15.4(2)T1, 15.4(3)M
Bug Id:
CSCug38248
Title:
Watchdog Crash on "CFT Timer" When Unbinding & Deleting Child Flow
Description:

Symptom: Watchdog crash is observed on "Common Flow Table" timer process. For example:
%SYS-2-WATCHDOG: Process aborted on watchdog timeout, process = CFT Timer Process.
Conditions: Error is raised due to a CPU loop while attempting to unbind and delete a child flow in the "CFT Timer" process.
Workaround: There is no workaround.



Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.3(2)T
Known Fixed Releases:
15.0(11.6)EMW, 15.1(1)ICA4.122, 15.2(1)IC273.5, 15.2(2)E, 15.2(4)JB, 15.2(4)JB1, 15.2(4)JB3, 15.2(4)JB3a, 15.2(4)JB3b, 15.2(4)JB3s
Bug Id:
CSCty02015
Title:
%DSPRM-2-DSPALARM: Received alarm indication from dsp (0/1). Resetting t
Description:

Symptom:
DSP crashes and resets under load combined with line impairments on fax channels.

Conditions:
Crashes can occur when (1) FAX calls are acitve, (2) there are impairments on the TDM side (loss, etc.). We strongly suspect that specifically impairments on FAX lines trigger the DSP Crashes.

Workaround:
None. As of this writing, there is a root cause and an engineering fix in test. Contact support for details.

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
15.1(0.3)T
Known Fixed Releases:
Bug Id:
CSCuu95673
Title:
CISCO3925 with 154-3.M1 may keep crashing
Description:

Symptom:
Device kept crashing with same traces, and reporting:

Unexpected exception to CPU: vector 1400

Conditions:
Voice

The root cause and other condition is under investigation.

Workaround:
problem is not seen on 15.3(3)M5

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.4(3)
Known Fixed Releases:
Bug Id:
CSCtr26373
Title:
PQ3_TSEC Gig interface hangs due to stuck Rx ring
Description:

Symptom:
Interface experiences resource exhaustion and throttles. When coming out of the throttle condition the interface may get stuck and stop receiving traffic. All ingress traffic will then be counted as "input errors".

Conditions:
This has been observed on onboard GE interfaces of Cisco 39xx and
Cisco 2951 routers. It may be seen at random times. The interface will still
show "up/up" in the show interface output.

Workaround:
Reset the interface to restore connectivity.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.1(2)T3
Known Fixed Releases:
15.0(1)M10, 15.0(1)M8.3, 15.0(1)M9, 15.1(2)T4.1, 15.1(2)T4.2, 15.1(2)T5, 15.1(3)T1.6, 15.1(3)T2, 15.1(3)T3, 15.1(3)T4
Bug Id:
CSCus89791
Title:
g722-64 codec crash during dial tone with country code
Description:

Symptom:
Router gateway may crash with the g722-64 codec when processing country codes.

Conditions:
g722-64 codec must be configured. This issue is still under investigation

Workaround:
Remove g722-64 if possible.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
15.3(3)S5.7, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S2.7, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(1)T1.1, 15.5(1)T2
Bug Id:
CSCut78892
Title:
[PI28] Router crash while unconfiguring DMVPN tunnel
Description:

Symptom:
Router crash and reload while unconfiguring

Conditions:
While unconfiguring DMVPN tunnel

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(3)M
Known Fixed Releases:
15.4(3)M2.2, 15.4(3)M3, 15.5(2)T0.1, 15.5(2)T1, 15.5(2.14)T, 15.5(2.14.1)PIH28
Bug Id:
CSCup67654
Title:
ISM-VPN module crash due to memory leak;Traceback = 1000b8a0 or 1000b8c0
Description:

Symptom:
-ISM crashes on ISR G2 running 152-4.M6a
-ACE Crash Info file yields traceback of the following:

======== Stack Back Trace ========
-Traceback= 1000b8a0
or
-Traceback= 1000b8c0

-Logging buffer may show the following:

May 28 07:32:56.769: Reventon small chunk is not destroyable
May 28 07:32:56.769: Reventon medium chunk is not destroyable
May 28 07:32:56.769: Reventon big chunk is not destroyable
May 28 07:32:56.777: %VPN_HW-6-SHUTDOWN: shutting down
May 28 07:33:03.645: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF
May 28 07:33:03.645: Reventon small chunk is not destroyable
May 28 07:33:03.645: Reventon medium chunk is not destroyable
May 28 07:33:03.645: Reventon big chunk is not destroyable
May 28 07:33:03.645: %VPN_HW-6-SHUTDOWN: shutting down

Conditions:
-Have ISM-VPN module enabled and encrypting traffic in ISR G2 platform
-DMVPN may be a factor

Workaround:
-Disable ISM and use onboard crypto engine with command "no crypto engine slot 0"
-If ISM has crashed, the router must be reloaded to recover module

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.2(4)M3.11, 15.2(4)M6.1, 15.3(3)M3
Known Fixed Releases:
15.2(4)M8, 15.3(3)M5.1, 15.4(3)M2.2
Bug Id:
CSCuh73594
Title:
c3900's ISM module crashed with traffic 1.5k DMVPN + EIGRP tunnels
Description:

Symptom:
ISM-VPN card module crashes while handling high traffic for long hours
Conditions:
With high numbers of DMVPN tunnels under high volume of traffic.
Workaround:
Disable ISM-VPN module and use onboard encryption crupto-engine.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.3(2.25)M0.1
Known Fixed Releases:
15.2(4)M7.1, 15.3(3)M5.1, 15.4(2.3)T, 15.4(3.6)PIB25
Bug Id:
CSCug61466
Title:
CUBE crashes @ sipSPI_ipip_cleanup_stream_channel_array
Description:

Symptom:
Symptom:
CUBE crashes for DO-EO ReINV_HD call.

Conditions:
Conditions:
CUBE crashes for DO-EO ReINV_HD call.

Workaround:
Workaround:
Issue fixed and committed

Further Problem Description:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.3(2)S0.6, 15.3(2)T1.2, 15.3(2.12)T, 15.3(2.12.1)T, 15.3(2.16)T, 15.3(2.9)T
Known Fixed Releases:
15.2(1.2.41)PI22, 15.3(2)T1, 15.3(2)T1.3, 15.3(2)T2, 15.3(2)T3, 15.3(2)T4, 15.3(2.19)S0.6, 15.3(2.23)T, 15.3(3)M, 15.3(3)M1
Bug Id:
CSCut66144
Title:
VXML GW fails to handoff call to VXML Application on second VRU leg
Description:

Symptom:
Call comes in to VXML GW and the TCL script for bootstrap comes up but VXML does not.

HTTP Get is never sent to CVP Server so then CVP Server times out and disconnects the call as never got any HTTP get from GW.

15.3.3.M5

Conditions:
High volume on the GW.

Workaround:
no workaround.

Further Problem Description:
GW is showing this.

9931429: Mar 26 14:22:21.839: //873876//MSM :/ms_handle_stream_timer: >>ms_start_play()
9931430: Mar 26 14:22:21.839: //873876//MSM :/ms_start_play: 1w4d, Tstart(ply: num 22 max 196 StDly 10)

Message should be.

ms_start_play: 1w4d mgdTstop(ply)

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(0.1)
Known Fixed Releases:
15.3(3)M5.2, 15.3(3)S5.12, 15.4(3)S3.3, 15.5(2)S0.9, 15.5(2)T0.1, 15.5(2)T1, 15.5(2.12)T, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28, 15.5(2.19)S
Bug Id:
CSCur01171
Title:
Memory leak in MRCP_CLIENT in add_to_hoststatus_table
Description:

Symptom:
SIP calls caused MRCP_CLIENT to leak memory

Conditions:
these 3 processes steadily increase memory holding
C3925MCCUBE1#sh proc mem sorted

PID TTY Allocated Freed Holding Getbufs Retbufs Process
379 0 141675176 3712923352 49236032 0 0 CCSIP_SPI_CONTRO
400 0 53990776 304432952 15530048 0 0 MRCP_CLIENT
295 0 2278473520 1587812972 10569436 0 0 http client proc

Workaround:
none

Further Problem Description:
Engineering believes the fix in CSCur07571 might have addressed this issue. The fix of CSCur07571 now available in 152-4-M6 or newer.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M3.11, 15.2(4)M6
Known Fixed Releases:
15.3(3)M5.2, 15.3(3)S5.17, 15.5(2.14)T, 15.5(2.14.1)PIH28, 15.5(2.16.5)PIH28, 15.5(2.21)S
Bug Id:
CSCuu98027
Title:
onepk memory corrupt crash when repeating sh policy-map
Description:

Symptom:
onePK application results in router crash with memory corruption when repeatedly running show policy-map command.

Conditions:
Using a onePK application that polls the router for information every 320ms

Workaround:
unknown at this point

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.4(3)M1a
Known Fixed Releases:
Bug Id:
CSCuq80985
Title:
Traceback seen at AFW_Snr_IsSipSnr
Description:

Symptom:
CME crashes intermittently

Conditions:
SNR configured on SIP CME

Workaround:
NONE

Further Problem Description:
NONE

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2TPI19
Known Fixed Releases:
15.3(3)M5.2, 15.3(3)S5.9, 15.5(1.10.1)GB, 15.5(1.13)S, 15.5(1.7)T, 15.5(2)S
Bug Id:
CSCul52326
Title:
L2TP/IPsec with NAT-T to ISR-G2 with ISM-VPN module fails
Description:

Symptom:
IKE Phase 1 and Phase 2 establishes, but we only see few packets decrypted (none encrypted). After couple of seconds both phases get cleared.
Traceback seen on ISM-VPN shim layer debug:
debug crypto engine ism shim

Conditions:
This symptom is observed under the following condition:
- ISR-G2 [1900/2900/3900] with active ISM-VPN module acting as L2TP over IPSec Server.
- L2TP PC is behind a NAT device, triggering NAT-traversal in IKE.

Workaround:
Perform the following workarounds:
- PCs that do not get NAT'ed can connect fine.
- switch to onboard crypto engine using the command, no crypto engine slot 0

Further Problem Description:
To see if ISM-VPN module is active:
1. show crypto engine brief
crypto engine name: Virtual Private Network (VPN) Module
crypto engine type: hardware
State: Enabled
Location: slot 0
Product Name: ISM VPN Accelerator
or

2. show crypto eli
Hardware Encryption : ACTIVE
Number of hardware crypto engines = 1

CryptoEngine ISM VPN details: state = Active

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(3)M
Known Fixed Releases:
15.2(4)M8, 15.3(3)M5.2, 15.4(3)M2.2, 15.4(3)M3, 15.5(1.11)T
Bug Id:
CSCuu19587
Title:
Tracebacks and TFO frame errors seen with WAAS-Ex, ISM-VPN and GetVPN
Description:

Symptom:
Tracebacks and TFO errors seen. ftp-data not getting optimized.

Conditions:
WAAS-Ex and ISM-VPN enabled in GetVPN environment.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M, 15.4(3)M, 15.5(2)T, 15.5(2.13)T, 15.5(2.14)T
Known Fixed Releases:
Bug Id:
CSCta20040
Title:
Device crashes when receiving invalid SIP message
Description:

Summary

Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device when SIP operation is enabled.

Cisco has released free software updates that address these vulnerabilities. There are no workarounds for devices that must run SIP; however, mitigations are available to limit exposure to the vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml.

Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier:

http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml

Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html

Cisco Unified Communications Manager (CUCM) is affected by the vulnerabilities described in this advisory. Two separate Cisco Security Advisories have been published to disclose the vulnerabilities that affect the Cisco Unified Communications Manager at the following locations:

http://www.cisco.com/warp/public/707/cisco-sa-20090826-cucm.shtml

http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucm.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
12.4(24.6)PI11i
Known Fixed Releases:
12.4(15)T12, 12.4(15)T13, 12.4(15)T14, 12.4(15)T16, 12.4(15)T17, 12.4(22)T4, 12.4(22)T5, 12.4(24)MDA13, 12.4(24)MDB13, 12.4(24)MDB14

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论