Cisco Blog » The Platform

2016年5月1日星期日

Cisco Notification Alert -Cisco 3900 Series Router-01-May-2016 16:53 GMT

 

 

 

 

 

 

 


Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS Version 15.5(3)M2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925 Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS Version 15.5(3)M2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3945E Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS Version 15.5(3)M2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Software Updates for 3900 Series Integrated Services Routers

Product Name:
3925E Integrated Services Router
Software Type:
NBAR2 Protocol Packs
Release Version:
19.0.0
Alert Type:
New File
File Name:
pp-adv-isrg2-155-3.M2-23-19.0.0.pack
File Description:

NBAR2 Advanced Protocol Pack 19.0.0 for IOS Version 15.5(3)M2

File Release Date:
26-APR-2016
Find additional information in Software Downloads index.

Known Bugs - 3900 Series Integrated Services Routers

Alert Type:
Updated *
Bug Id:
CSCuq15237
Title:
GM hangs while applying show crypto gdoi command
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
GM2 hangs after applying the command "show crypto gdoi | inc (POLICY|spi|remaining)"

Conditions:
This is seen in IPv6 IPSec scenarios.

Workaround:
Unknown

Further Problem Description:

Last Modified:
21-APR-2016
Known Affected Releases:
15.5(0.10)T, 15.5(0.11)T
Known Fixed Releases: *
15.0(2)EA, 15.0(2)EB, 15.0(2)EC, 15.0(2)ED, 15.0(2)EH, 15.0(2)EJ, 15.0(2)EJ1, 15.0(2)EK, 15.0(2)EK1, 15.0(2)EX
Alert Type:
Updated *
Bug Id:
CSCui79745
Title:
Crash @ crypto_engine_packet_callback in IPSEC on ISR Codenomicon
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
A vulnerability in IPSec processing of Cisco IOS Software could allow an authenticated, remote attacker to cause a reload of the affected device.

The vulnerability is due to improper processing of malformed IPSec packets. An attacker could exploit this vulnerability by sending malformed IPSec
packets to be processed by an affected device. An exploit could allow the attacker to cause a cause a reload of the affected device.


Conditions:
Cisco IOS device receiving malformed IPSec packets over an established IPSec SA, may crash.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
6.8/5.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2014-3299 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3299

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
21-APR-2016
Known Affected Releases:
15.4(0.12)T
Known Fixed Releases: *
15.2(1)SY1.13, 15.2(1)SY2, 15.2(2)E, 15.2(2.2.73)ST, 15.2(2.2.93)EA, 15.2(2.3)PSR, 15.2(2.39)PSR, 15.2(2b)E, 15.2(3)E, 15.2(4.0)ST
Alert Type:
Updated *
Bug Id:
CSCuy33804
Title:
Traceback seen @resolve_sig_ip_address_to_bind during SRTP calls
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback on T train and crash on S train

Conditions:
SRTP calls

Workaround:
None

Further Problem Description:

Last Modified:
28-APR-2016
Known Affected Releases:
15.6(1.22)T
Known Fixed Releases: *
15.3(3)S7.3, 15.6(1.22)T0.3, 15.6(2)T, 15.6(2.1)T, 16.2(0.308), 16.3(0.112)
Alert Type:
New
Bug Id:
CSCuz38194
Title:
CUBE in HA dual-attached, 39XX and 29XX reloading after switchover
Status:
Open
Severity:
2 Severe
Description:

Symptom:
STANDBY router reloading in dual-attached configuration after switch over.

Conditions:
ISR G2 3900 and 2900 in dual attached

turn off and on the interface for the HSRP group in the ACTIVE router, this is causing reload on the STANDBY router

Workaround:
none

Further Problem Description:

Last Modified:
27-APR-2016
Known Affected Releases:
15.3(3)M, 15.3(3.0q)M5.1
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCto53635
Title:
netflow always use default cache entry size after reboot
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When configuring Netflow cache entry size other than the default (64K), user needs to disable/re-enable Netflow on all applicable interfaces to make it take into effect after every reboot.

Conditions:
12.4T or 15.0M

Workaround:
None

Last Modified:
02-APR-2016
Known Affected Releases:
15.0(1)M4
Known Fixed Releases: *
12.2(31)SB15, 12.2(31)SB16, 12.2(31)SB17, 12.2(33)IRC, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16, 12.2(33)SB17, 12.2(33)SB4
Alert Type:
Updated *
Bug Id:
CSCtq72330
Title:
SYS-3-HARIKARI log is raised every time gw-accounting file is disabled
Status:
Terminated
Severity:
4 Minor
Description: *

Symptom:
The following syslog message is seen after disabling gw-accounting file

%SYS-3-HARIKARI: Process voice file acct dump top-level routine exited

Conditions:
Anytime gw-accounting file is disabled the system raised the following error message and logs it according to the router's logging configuration.

Workaround:
None to prevent the error message from being raised. The error message can be safely ignored and does not indicate a software error.

More Info:

Last Modified:
11-APR-2016
Known Affected Releases:
15.1(4)M0b
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz35129
Title:
Display issues on SIP phone registration during SRST
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:
Here are two display issues in IOS 15.4(3)M5 that are display bugs..

(1) Gateway only showed 1 registered device instead of 36
(2) Residue of sip register dial-peers

When you run the command ?Show Sip Registered status? and you are not in SRST, it is supposed to clear. All sip devices send an unregister request. So regardless, the VGW does not wait for the timer to expire. RFC 1592

Talmadge-2921-VGW#sh sip register status
Line peer expires(sec) reg survival P-Associ-URI
================================ ========== ============ === ======== ============
31101 40018 114 no normal
31102 40024 117 no normal
31103 40002 89 no normal
31104 40019 114 no normal
31105 40023 116 no normal
31106 40022 116 no normal
31107 40034 148 no normal
31108 40025 120 no normal
31109 40001 89 no normal


Second, Obviously we have more the 1 registered device in SRST.

Talmadge-2921-VGW#sh voice register statistics
Global statistics
Active registrations : 34

Total SIP phones registered: 1
Total Registration Statistics
Registration requests : 97
Registration success : 97
Registration failed : 0
unRegister requests : 63
unRegister success : 63
unRegister failed : 0
Attempts to register
after last unregister : 0
Last register request time : 13:41:34.525 DST Fri Apr 1 2016
Last unregister request time : 12:36:19.074 DST Fri Apr 1 2016
Register success time : 13:41:34.525 DST Fri Apr 1 2016
Unregister success time : 12:36:19.076 DST Fri Apr 1 2016

Conditions:
SIP Phone SRST registrations and unregistration outputs

Workaround:
None. Not service impacting, just inaccurate show outputs

Further Problem Description:

Last Modified:
26-APR-2016
Known Affected Releases:
15.6(1.6)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuz41767
Title:
Authenticate command missing for SIP-UA
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Customer needs to know all of the commands possible in order to initiate the SIP-UA.

On entering voice-class tenant 1 the process is not clear within the documentation.

Conditions:
N/A

Workaround:
Create a more detailed section within the documentation to explain what the steps are to create the SIP-UA.

Further Problem Description:
N/A

Last Modified:
28-APR-2016
Known Affected Releases:
15.6(2.3)T
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论