Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -Nexus 3000 Series Switch-01-Jul-2015 16:48 GMT

 

 

 

 

 

 

 


Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3132Q Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3048 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3016 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3048 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064-T Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3172 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3548 Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)A4(6)
Alert Type:
New File
File Name:
n3500-uk9.6.0.2.A4.6.bin
File Description:

Nexus 3500 Release 6.0(2)A4(6) System Image

File Release Date:
15-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3548 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)A4(6)
Alert Type:
New File
File Name:
poap_script.6.0.2.A4.6.tcl
File Description:

Nexus 3500 Release 6.0(2)A4(6) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
15-JUN-2015
Alert Type:
New File
File Name:
n3500-uk9-kickstart.6.0.2.A4.6.bin
File Description:

Nexus 3500 Release 6.0(2)A4(6) Kickstart Image

File Release Date:
15-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.A4.6.py
File Description:

Nexus 3500 Release 6.0(2)A4(6) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
15-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3064-T Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3016 Switch
Software Type:
NX-OS Kick Start
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.py
File Description:

Nexus 3000 Release 6.0(2)U5(3) Python Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
n3000-uk9-kickstart.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) Kickstart Image

File Release Date:
11-JUN-2015
Alert Type:
New File
File Name:
poap_script.6.0.2.U5.3.tcl
File Description:

Nexus 3000 Release 6.0(2)U5(3) TCL Reference script for PowerOn Auto Provisioning (POAP)

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 3000 Series Switches

Product Name:
Nexus 3132Q Switch
Software Type:
NX-OS System Software
Release Version:
6.0(2)U5(3)
Alert Type:
New File
File Name:
n3000-uk9.6.0.2.U5.3.bin
File Description:

Nexus 3000 Release 6.0(2)U5(3) System Image

File Release Date:
10-JUN-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 3000 Series Switches

Bug Id:
CSCup45866
Title:
Persistent high rate of HW errors can trigger plog_sup process crash
Description:

Symptom:
Device will crash due to plog_sup HAP reset. Following logs will be seen in OBFL

%KERN-2-SYSTEM_MSG: [ 1012.114305] [sap 1016][pid 3201][comm:plog_sup] sap recovering failed and so Killed - kernel
%SYSMGR-2-SERVICE_CRASHED: Service "plog_sup" (PID 3201) hasn't caught signal 9 (no core).
%SYSMGR-2-HAP_FAILURE_SUP_RESET: System reset due to service "plog_sup" in vdc 1 has had a hap failure
%KERN-0-SYSTEM_MSG: [ 1020.936979] writing reset reason 16, plog_sup hap reset - kernel

Conditions:
If the parity interrupts are in ECC Protected SRAM, the interrupts should be persistent even after a reload. If not refer CSCus74195

Workaround:
This is a uncorrectable parity problem in the ASIC. The device will need to be replaced.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
6.0(2)U2(4)
Known Fixed Releases:
6.0(2)A3(3.70), 6.0(2)A3(4), 6.0(2)A4(0.784), 6.0(2)A4(1), 6.0(2)U3(3.70), 6.0(2)U3(4), 6.0(2)U4(0.784), 6.0(2)U4(1)
Bug Id:
CSCui89328
Title:
Nexus 3500: All Ports Move to a Hardware Failure State
Description:

Symptom:
All the ports are shut down with the following error messages:

%NOHMS-2-NOHMS_DIAG_ERROR: Module 1: Runtime diag detected major event: Port failure: Ethernet /
%ETHPORT-3-IF_DOWN_HW_FAILURE: Interface Ethernet/ is down (Hardware Failure)

Conditions:
- Parity Error
- 6.0(2)A1(1a) or older

Workaround:
Reload the device.

Further Problem Description:
It is recommended to run 6.0(2)A1(1c) or later if you encounter this issue.

This bug changed the following:
- Only ports related to a soft parity error are moved into a failure state. This allows traffic to flow normally on unaffected ports prior to the reload.
- Provides more granular output in logs for the cause of the parity error.

Both changes are partially implemented in 6.0(2)A1(1b) and fully implemented 6.0(2)A1(1c) and later.

All ports shutting down in 6.0(2)A1(1b) may still be a soft parity error. If a Nexus 3500 shuts down all ports in 6.0(2)A1(1c) or later, the switch should be replaced.

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
6.0(2)A1(0.99)
Known Fixed Releases:
6.0(2)A1(1c)
Bug Id:
CSCuo81303
Title:
All ports error disabled after LPM parity error at a particular index
Description:

Symptom:
All ports will go error-disabled and following message will appear in syslog

2014 May 14 06:16:16 %USER-3-SYSTEM_MSG: bcm_usd_notif_err_hwfail_helper:487: front-port 1, send hwFailure request success - bcm_usd
2014 May 14 06:16:16 %USER-3-SYSTEM_MSG: bcm_usd_notif_err_hwfail_helper:487: front-port 2, send hwFailure request success - bcm_usd
2014 May 14 06:16:16 %USER-3-SYSTEM_MSG: bcm_usd_notif_err_hwfail_helper:487: front-port 3, send hwFailure request success - bcm_usd
2014 May 14 06:16:16 %USER-3-SYSTEM_MSG: bcm_usd_notif_err_hwfail_helper:487: front-port 4, send hwFailure request success - bcm_usd

Conditions:
This only happens when parity errors are detected at specific indices across various tables

Workaround:
None

Further Problem Description:
For LPM parity error happens at index 4192 will cause the following issue

bcm_usd_isr_switch_event_cb_log:834: slot_num 0, event 2, memory error type: Detection(0x1), table name: L3 LPM table(0x83000806),
index: 4192
bcm_usd_isr_switch_event_cb_log:778: slot_num 0, event 2, memory error type: Correction(0x5), table name: L3 LPM table(0x806), ind
ex: 4192

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUN-2015
Known Affected Releases:
6.0(2)U2(1)
Known Fixed Releases:
6.0(2)U2(8.96), 6.0(2)U2(9Z)
Bug Id:
CSCus75034
Title:
Nexus 3500 - Flexlink Mcast Fast Convergence - no IGMP report leak
Description:

Symptom:
No IGMP reports are leaked over Backup Standby Port in Flexlink configuration when Mcast fast convergence is configured.

No IGMP snooping entry is created on the upstream switch for the port connecting to the Backup port on the N3500 side.
This would lead to high Mcast convergence when Active Port goes down and Standby port becomes active as upstream switch would not be forwarding multicast traffic for the hosts connected on the N3500.

Conditions:
Flexlink configuration with Mcast Fast convergence configured:

switchport backup interface <> multicast fast-convergence

The upstream switch connecting to the backup port does not receive any IGMP reports for the hosts/receivers connected across N3500 switch.

Workaround:
Add static IGMP snooping entry on the Upstream switch connecting to the N3k backup port. Example if upstream is a N5k/N3k/N7k switch:
ip igmp snooping static-group interface <#port or po connecting to backup port>

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
6.0(2)A3(2.68), 6.0(2)A4(3)
Known Fixed Releases:
6.0(2)A6(0.65), 6.0(2)A6(1)
Bug Id:
CSCup91289
Title:
Nexus 3548 Netstack Crashes by Generating Oversized Pings Continuously
Description:

Symptom:
Nexus 3548 has multiple "netstack" crashes by generating oversized pings continuously with the following command:

DC1-3548A# ping 100.100.20.4 timeout 0 count unlimited packet-size 65468

Conditions:
It happens when oversized pings are generated locally and continuously.

Workaround:
Do not ping with maximum packet-size. Crash does not happen with default ping packet-size.

Further Problem Description:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.0(2)A1(1c)
Known Fixed Releases:
6.0(2)A4(0.855), 6.0(2)A4(1), 6.0(2)U4(0.855), 6.0(2)U4(1)
Bug Id:
CSCuu35333
Title:
Should not shutdown system when there is PS or FAN direction mismatch
Description:

Symptom:
Donot shutdown system due to fan/PS direction mismatch.

Print Sev1 syslogs every minute instead.

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.0(2)U3(7.103)
Known Fixed Releases:
Bug Id:
CSCus81622
Title:
POAP Nexus3000 intermittently selects wrong configuration
Description:

Symptom:
Nexus3000 may select an incorrect configuration -- i.e. a configuration intended for another switch -- when it boots from a DHCP/POAP server.

Conditions:
Occurs more frequently in an environment with tens of switches booting simultaneously since DHCP requests are more likely to occur simultaneously as the number of switches increases. The testbed in which the issue was found contained sixty Nexus3000 switches booting from a single DHCP/POAP server.

Workaround:
Upgrade to an image in which this defect is resolved.

Further Problem Description:
The issue is due to DHCP transaction ID not being randomized when DHCP request is sent by the Nexus3000. Hence Nexus3000 is not able to discriminate resulting DHCP OFFERs from a DHCP server and will accept OFFERs intended for other Nexus3000 since these OFFERs will contain the same transaction ID.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
6.0(2)U6(0.75), 6.0(2)U6(1), 6.1(2)I3(3.95), 6.1(2)I3(4)
Bug Id:
CSCur55507
Title:
N3K may face a mtc_usd hap reset due to an arithmetic exception
Description:

Symptom:
Nexus 3500 may face a mtc_usd hap reset due to an arithmetic exception, and a core file will be generated:

Module Instance Process-name PID Date(Year-Month-Day Time)
------ -------- --------------- -------- -------------------------
1 1 mtc_usd 3273 2014-10-18 07:38:57
1 2 mtc_usd 3273 2014-10-18 07:38:57
1 3 mtc_usd 3273 2014-10-18 07:38:57

Conditions:
Unknown

Workaround:
Unknown

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
04-JUN-2015
Known Affected Releases:
6.0(2)A1(1c)
Known Fixed Releases:
6.0(2)A4(1.33), 6.0(2)A4(3), 6.0(2)A5(0.991), 6.0(2)A5(1), 6.0(2)U4(1.33), 6.0(2)U4(3), 6.0(2)U5(0.991), 6.0(2)U5(1)
Bug Id:
CSCus34881
Title:
N3k - SNMPD crash due to segmentation fault polling port_manager
Description:

Symptom:
NX-OS SNMPd process crashes with HAP reset.

Conditions:
SNMP GET requests to IF-MIB may cause the SNMP deamon to crash due to a segmentation fault while trying to fetch the interface counters belonging to a port channel.

Workaround:
Do not poll OID's to collect interface counters belonging to a port-channel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A5(1.37), 6.0(2)A5(2), 6.0(2)A6(0.64), 6.0(2)A6(0.66), 6.0(2)A6(0.78), 6.0(2)A6(1), 6.0(2)U5(1.37), 6.0(2)U5(2), 6.0(2)U6(0.64), 6.0(2)U6(0.66)
Bug Id:
CSCuu19695
Title:
Multicast traffic not forwarded when loopback interface used as RP
Description:

Symptom:
When a loopback interface address is configured as a resource provider (RP), the PIM register message received from the FHR is not processed. This results in traffic loss to all downstream devices.

Conditions:
This issue occurs when a loopback interface is configured as RP and we bring up the box using copy r s reload.

Workaround:
Reconfigure the RP address

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
6.0(2)A4(4)
Known Fixed Releases:
6.0(2)A4(5.49), 6.0(2)A4(6), 6.0(2)A6(2.25), 6.0(2)A6(3), 6.0(2)U4(4.49), 6.0(2)U4(5), 6.0(2)U6(1.25), 6.0(2)U6(2)
Bug Id:
CSCuu25368
Title:
[N3548] Openflow: Flows are getting disappeared on reload
Description:

Symptom:
OpenFlow programmed flows are not getting retained after reloading the switch.

Conditions:
This issue occurs when:
- OpenFlow is enabled in hybrid mode
- L2 Multicast is enabled

Workaround:
1) OpenFlow can be configured in openflow-only mode if no other protocols are required on the switch.
OR
2) If the OpenFlow has to be hybrid mode, re-trigger the flow programming from the OpenFlow controller after the reload.

Further Problem Description:
Openflow flow entries are failed to get re-programmed on reloading the switch. This is due to the internal table conflict with L2 multicast entries.

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
6.0(2)A6(2)
Known Fixed Releases:
6.0(2)A4(5.49), 6.0(2)A4(6), 6.0(2)A6(2.25), 6.0(2)A6(3), 6.0(2)U4(4.49), 6.0(2)U4(5), 6.0(2)U6(1.25), 6.0(2)U6(2)
Bug Id:
CSCur04934
Title:
Nexus 3000/3500 - Product evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
Symptoms:
The Nexus 3000 and 3500 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187
CVE-2014-6277
CVE-2014-6278

This bug has been opened to address the potential impact on this product.

Conditions:
Conditions:
A user must first successfully log in and authenticate via SSH to trigger this vulnerability.

Workaround:
Workaround:
Not available.

Release with the vulnerability fix:
6.0(2)A3(4), 6.0(2)U3(4) - CCO posted on 10/11

Release expected in future: (Contact Deepak Patwardhan - depatwar for dates)
6.0(2)U2(6)
6.0(2)A4(2), 6.0(2)U4(2)
6.0(2)U5(1) - Nexus3000 only

Further Problem Description:
Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
6.0(2)U4(1), 7.0(99.1)ZZ, 9.5(1)N1(7.8)
Known Fixed Releases:
5.0(3)U5(0.214), 5.0(3)U5(1j), 6.0(2)A3(3.80), 6.0(2)A3(3.82), 6.0(2)A3(4), 6.0(2)A4(1.21), 6.0(2)A4(2), 6.0(2)A5(0.918), 6.0(2)A5(0.920), 6.0(2)A5(1)
Bug Id:
CSCur32090
Title:
N3k - SNMPD crash due to memory leak polling SFP sensor thresholds
Description:

Symptom:
SNMPD crashes due to memory leak while polling CISCO-ENTITY-SENSOR-MIB. Specifically for OID's and indexes collecting SFP thresholds.

Conditions:
Get Requests to collect SFP thresholds using OID's of CISCO-ENTITY-SENSOR-MIB

Workaround:
Do not poll OID's to collect SFP Sensor values and thresholds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
6.0(2)U3(0.759), 6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A4(1.25), 6.0(2)A4(2), 6.0(2)A5(0.938), 6.0(2)A5(1), 6.0(2)U3(5.93), 6.0(2)U3(6), 6.0(2)U4(1.25), 6.0(2)U4(2), 6.0(2)U5(0.938), 6.0(2)U5(1)
Bug Id:
CSCup80823
Title:
SVI not responding to ARP request after reload
Description:

Symptom:
Incomplete ARPs entries can occur randomly after a Nexus 3000 switch is reloaded.

To verify this condition check if the following counter is incrementing -

sh ip arp statistics vlan 2000 interface-all
ARP packet statistics for interface: Vlan2000
...
Received:
Total 24576, Requests 0, Replies 0, Requests on L2 0, Replies on L2 0
Proxy arp 0, Local-Proxy arp 0, Tunneled 0, Fastpath 0, Snooped 0, Dropped 24576
Received packet drops details:
Appeared on a wrong interface : 24576 <<<<<<<<<<<<<<<<<<<<<<<<< This is incrementing

You may also see syslogs message like

%ARP-3-REQ_NON_AM: arp [3393] Sending ARP request for X.X.X.X on invalid interface VlanXXX request from pid: XXXX

Conditions:
After reloading the switch.

Workaround:
We can try bouncing the SVI and if this does not recover it then reload the switch again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A3(3.70), 6.0(2)A3(4), 6.0(2)A4(0.817), 6.0(2)A4(1), 6.0(2)U3(3.70), 6.0(2)U3(4), 6.0(2)U4(0.817), 6.0(2)U4(1), 7.0(3)I2(0.122), 7.0(3)I2(1)
Bug Id:
CSCuo55510
Title:
Unable to program /128 entry in hardware due to missing adjacency
Description:


Symptom:========

When hardware tables are full and more routes are added, the excess routes are not updated properly in subsequent operations
Conditions:==========

This happens when more routes are added than which is capability of the hardware.


Workaround:==========

The workaround is to clear all the ipv4+ipv6 adjacencies with force option and then then clear all the ipv4+ipv6 routes



Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
5.0(3)U5(1f), 6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A4(0.773), 6.0(2)A4(1), 6.0(2)U4(0.773), 6.0(2)U4(1)
Bug Id:
CSCup62071
Title:
Nexus 3000 - MAC incorrectly point to peer-link upon reload in VPC setup
Description:

Symptom:
Nexus 3000 in VPC setup may observe incorrect MAC entries following reload of the switch in VPC. Some MAC's may point to peer-link while should be the VPC PO.

Conditions:
Not exactly known. However after reload or power cycle of one of the switches in VPC setup.

Workaround:
'clear mac address-table dynamic' correct the entries.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.0(2)U2(1)
Known Fixed Releases:
6.0(2)U3(1)
Bug Id:
CSCus34355
Title:
recursive-route updates not pushed to hardware in certain conditions
Description:

Symptom:
N3k continues to forward traffic to a failed HA box due to egress port not getting updated

Conditions:
Trigger for this issue is Mac Move of directly connected next-hop on vlan interface from one physical port to another physical port.

Affects only IPv4 recursive routes with single next-hop.

Workaround:
clear ip arp force-delete

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.0(2)U4(1.35), 6.0(2)U4(1M)
Known Fixed Releases:
6.0(2)A4(3.36), 6.0(2)A4(3.41), 6.0(2)A4(4), 6.0(2)A5(0.34), 6.0(2)A5(1), 6.0(2)A5(1.37), 6.0(2)A5(2), 6.0(2)U4(3.36), 6.0(2)U4(3.41), 6.0(2)U4(4)
Bug Id:
CSCuq14486
Title:
FIJI-MR-2:Volatile databse usage high, ipfib crash
Description:

Symptom:
system reset due to service "ipfib" in vdc 1 has had a hap failure

Conditions:
500 multicast receivers joins 500 multicast groups resulting in 250000 mroutes.

Workaround:
Limit the mroutes within the recommended scale limits.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
6.0(2)U3(2.63), 6.0(2)U4(0.809)
Known Fixed Releases:
6.0(2)A3(3.69), 6.0(2)A3(3.70), 6.0(2)A3(4), 6.0(2)A4(0.858), 6.0(2)A4(1), 6.0(2)U3(3.69), 6.0(2)U3(3.70), 6.0(2)U3(4), 6.0(2)U4(0.858), 6.0(2)U4(1)
Bug Id:
CSCur83153
Title:
NDB may stop working unexpectedly
Description:

Symptom:
After some time of normal operation, Nexus Data Broker (NDB) is suddenly no longer reachable
through the GUI.

Openflow switches using the underlying XNC as controller report a connection failure to the
controller. For example:

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: no response to
inactivity probe after 5 seconds, disconnecting

2014 Nov 9 05:06:22 switch01 %VMAN-5-VIRT_INST_NOTICE: VIRTUAL SERVICE
ofa_ndbemb LOG: OVS: sw1<->tcp:10.0.0.1:6653%management: connection failed
(Connection reset by peer)

Conditions:
This has been observed on NDB 2.0 running embedded on a Nexus 3548 running NXOS 6.0(2)A4(1)
It is not confirmed at this time whether or not other versions or other platforms are affected.

Workaround:
Restart the NDB service:
conf t
onep
virtual-service ofa_ndb
no activate
activate
exit

Please note: unsaved changes in NDB will be lost.

Further Problem Description:
This defect only affects the working of the controller and the NDB application, it does not
affect the flows created by the controller, except flows that were created but not saved.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:TF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.0(2)U4(0.41)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(6), 6.0(2)A6(0.17), 6.0(2)A6(1), 6.0(2)U4(4.47), 6.0(2)U4(5), 6.0(2)U6(0.17), 6.0(2)U6(1), 7.0(0)BZ(0.46), 7.0(0)HSK(0.357)
Bug Id:
CSCus26875
Title:
December 2014 - NTPd.org Vulnerabilities
Description:

Symptom:
The following Cisco products

Cisco Nexus 3000 Switches

include a version of NTPd that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-9293, CVE-2014-9294, CVE-2014-9295 and CVE-2014-9296

This bug has been opened to address the potential impact on this product.

Please consult http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd for further information.

Conditions:
feature ntp

Workaround:
Block NTP query requests:

ntp access-group query-only query-only-acl

Below shows an example of the NX-OS host being a NTP client:

ntp server 192.168.0.1 use-vrf management
ntp source-interface mgmt0
ntp access-group peer ntp-peer
ntp access-group query-only ntp-query-only
!
ip access-list ntp-peer
statistics per-entry
! Permit the NTP servers you wish to sync with
10 permit udp 192.168.0.1/32 any log
ip access-list ntp-query-only
statistics per-entry
! Deny NTP control messages from any host.
10 deny ip any any log
!

For more information consult: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3000/sw/system_mgmt/6_x/b_3k_System_Mgmt_Config_6_x/b_3k_System_Mgmt_Config_6_x_chapter_010010.html#task_B61435A7608D4FDBAA43AC77C8C0B76D

Further Problem Description:
PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
6.0(2)A4(3.43), 6.0(2)A4(4), 6.0(2)A5(1.38), 6.0(2)A5(2), 6.0(2)A6(0.44), 6.0(2)A6(1), 6.0(2)U4(3.43), 6.0(2)U4(4), 6.0(2)U5(1.38), 6.0(2)U5(2)
Bug Id:
CSCut97806
Title:
1G link not up in QI2-CR with autoneg enabled.
Description:

Symptom:
1G ports does not link up between Nexus 3172PQ and other peers

Conditions:
When Nexus 3172 is configured in 48x10G+6x40G portmode

Workaround:
Two options:
a) Configure portmode as 48x10g+breakout6x40g. In this mode, 1G ports does not have this issue. Also the last QSFP ports will work in 40G mode.
b) Disable auto-negotiation (AN) on the affected interface using "no negotiate auto" in interface configuration mode. Note that this command will fail while the interface is assigned to a port-channel. Procedure in this case is to first remove the "channel-group" command, then add the "no negotiate auto" and then re-apply the "channel-group".

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
6.0(2)U6(2)
Bug Id:
CSCur52703
Title:
HSRP active n3500/n3000 does not respond arp to resolve its own VIP
Description:

Symptom:
n3500 does not respond to arp request sent to resolve its hsrp VIP and cannot ping its own VIP

Conditions:
n3500 is HSRP active

Workaround:
un-configure and reconfigure the HSRP virtual ip from the svi hsrp-subconfig.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
18-JUN-2015
Known Affected Releases:
6.0(2)A4(1)
Known Fixed Releases:
6.0(2)A4(3), 6.0(2)A5(0.978), 6.0(2)A5(1), 6.0(2)U4(3), 6.0(2)U5(0.978), 6.0(2)U5(1)
Bug Id:
CSCup43205
Title:
Nexus 3500: Support for Packets with Multicast MAC
Description:

Symptom:
Microsoft NLB traffic and ISIS Hello packets are not forwarded by Nexus 3548 when used as a transit device.

Conditions:
- Nexus 3500
- Traffic with multicast mac and unicast IP OR multicast mac and no ip header

Workaround:
None.

Further Problem Description:
Forwarding of this traffic type is currently unsupported on this platform. This issue is present because the Nexus 3548 platform currently performs a L2 and L3 lookup on multicast packets.

This enhancement was filed to add the ability to only perform a L2 only lookup mode.

Status:
Terminated
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
6.0(2)A3(1), 6.0(2)A4(1)
Known Fixed Releases:
Bug Id:
CSCuo40395
Title:
Nexus 3000 bcm_usd core is seen
Description:

Symptom:
Nexus 3000 may experience an unexpected crash.

Conditions:
A core file will be created with the bcm_usd process.

Workaround:
None known.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
6.0(2)U3(1)
Known Fixed Releases:
6.0(2)A3(0.6), 6.0(2)A3(1), 6.0(2)U3(0.6), 6.0(2)U3(1)
Bug Id:
CSCuu84112
Title:
N3k - adjacency entry misprogrammed in hardware
Description:

Symptom:
Flows getting blackholed because next hop information is incorrect in hardware

Conditions:
none

Workaround:
clear ip arp force-delete

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
Bug Id:
CSCuq59689
Title:
BGP Session Down when NAT max-entries is reached
Description:

Symptom:
When NAT max-entries is reached and the following error is seen:

2014 Aug 25 18:31:34 R11.N3500.Top netstack[3647]: NAT: Can't create dynamic translations, maximum limit reached

A BGP peer using the outside NAT interface will go down with the following log message:

2014 Aug 25 18:31:40 R11.N3500.Top %BGP-5-ADJCHANGE: bgp-10 [3775] (default) neighbor 172.17.0.18 Down - holdtimer expired error

Conditions:
NAT translation max-entries is reached with BGP neighbor configured using the natted interface.

Workaround:
clear ip nat translation all

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
6.0(2)A3(1)
Known Fixed Releases:
6.0(2)A4(3.36), 6.0(2)A4(4), 6.0(2)A5(0.911), 6.0(2)A5(1), 6.0(2)U4(3.36), 6.0(2)U4(4), 6.0(2)U5(0.911), 6.0(2)U5(1)
Bug Id:
CSCuu80493
Title:
MSDP sa-policy filters all SA
Description:

Symptom:
All SA are being filtered by MSDP sa-policy if route-map contains "match ip address " statement. Such configuration is not supported.

The correct configuration is "match ip multicast "

Conditions:
Route-map used for sa-policy contains "match ip address " statement.

Workaround:
The correct configuration is "match ip multicast " under route-map.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)A6(2)
Known Fixed Releases:
Bug Id:
CSCun37604
Title:
install add fails when we use non-mgmt ports for ftp/tftp/scp
Description:

Symptom:
install add fails

Conditions:
when we use location as ftp/scp/tftp using non-management vrf.

Workaround:
Use management vrf.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
7.0(0)BNZ(0.23), 7.1(0)D1(0.113), 7.1(0)D1(0.132), 7.1(0)FC(0.2), 7.1(0)NF(0.28), 7.1(0)PDB(0.94), 7.1(0)ZD(0.178), 7.2(0)D1(1), 7.2(1)N1(0.1), 7.2(1)N1(1)
Bug Id:
CSCuf36771
Title:
N3k-OF:Vlan ID is removed when packets are punted to controller
Description:

Symptom:
When the Datapath Service Set is asked to provide Layer-2 frames to it's client, the frames will be missing any 802.1Q or QinQ header that may have originally been on the frame.

This in turn affects any OpenFlow packets sent to the controller, preventing the controller from properly performing reactive-mode learning switch or similar operations.

Conditions:
When 802.1q tagged packets need to be diverted via the OneP Datapath Service Set to a client, including to an OpenFlow controller by way of the Cisco Plug-in for OpenFlow Agent.

Workaround:
no known workarounds.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)U3(0.728)
Known Fixed Releases:
15.2(4.0.21)E, 6.0(2)A4(1), 6.0(2)U4(1), 7.1(0)ES(0.10), 7.1(0)ES(0.11), 7.1(0)ES(0.13), 7.1(0)ES(0.14), 7.2(0)VZD(0.36), 7.2(0)VZN(0.44), 7.3(0)D1(0.10)
Bug Id:
CSCut75234
Title:
BFD stops working after upgrade to A6.1
Description:

Symptom:
CoPP (including BFD) does not work after upgrading to 6.0(2)A6(1) or 6.0(2)A4(5) on N3500 platforms.

Conditions:
This issue occurs when the image is upgraded to 6.0(2)A6(1) or 6.0(2)A4(5) on N3500 platforms.

Workaround:
Modify the Copp policy by changing PPS for any one of the classes, or modify any one of the CoPP ACLs.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A6(1)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(6), 6.0(2)A6(1.21), 6.0(2)A6(2), 6.0(2)U4(4.47), 6.0(2)U4(5), 6.0(2)U6(0.21), 6.0(2)U6(1)
Bug Id:
CSCus68770
Title:
Nexus 3k/3500: assess GHOST vulnerability in glibc (CVE-2015-0235)
Description:

Symptom:
On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 10/7.8

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A4(1), 6.0(2)U5(0.37), 6.0(2)U5(1)
Known Fixed Releases:
6.0(2)A4(3.41), 6.0(2)A4(4), 6.0(2)A5(1.37), 6.0(2)A5(1.38), 6.0(2)A5(1.39), 6.0(2)A5(2), 6.0(2)A6(0.59), 6.0(2)A6(1), 6.0(2)U4(3.41), 6.0(2)U4(4)
Bug Id:
CSCuq61825
Title:
Nexus3500: Packet received on access vPC port w/ vlan id 0 not processed
Description:

Symptom:
The Cisco Nexus 3500 does not process the packets received on an access vPC port. This happens only when a dot1q header with VLAN id as 0 is received.

Conditions:
The port is in access port, and part of a vPC.
Issue is seen in 6.0(2)A3 releases.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A3(2.68), 6.0(2)A4(1)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(6), 6.0(2)A6(1), 6.0(2)U4(4.47), 6.0(2)U4(5)
Bug Id:
CSCut77415
Title:
APRIL 2015 NTPd Vulnerabilities
Description:

Symptom:
This product includes a version of ntpd that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798 and CVE-2015-1799

This bug has been opened to address the potential impact on this product.

Conditions:
Device configured with NTP and NTP Keys

All shipping versions affected.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)U6(1)
Known Fixed Releases:
6.0(2)A7(0.163), 6.0(2)A7(1), 6.0(2)U7(0.163), 6.0(2)U7(1)
Bug Id:
CSCut78781
Title:
N3000 does not install pim OIL for (S,G)
Description:

Symptom:
Missing PIM derived OIL for some (S,G)-s when multiple sources come online at the same time

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A4(5.59), 6.0(2)A4(6), 6.0(2)A6(2.44), 6.0(2)A6(3), 6.0(2)A7(0.167), 6.0(2)A7(1), 6.0(2)U4(4.59), 6.0(2)U4(5), 6.0(2)U6(1.44), 6.0(2)U6(2)
Bug Id:
CSCuu71710
Title:
N3500 : Kernel panic seen when UDP traffic hits the mgmt port
Description:

Symptom:
Nexus 3548: Kernel panic observed on 6.0(2)A4(5)

KERN-0-SYSTEM_MSG [2205608.520006] BUG: soft lockup - CPU#0 stuck for 11s! [usd_mts_kthread:3296]

Conditions:
Under high rate of incoming traffic on management interface

Workaround:
None

Further Problem Description:
Kernel panic was observed on Nexus3548 when there is a high incoming traffic rate(>150Mbps) on the management interface.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A4(5.63)
Known Fixed Releases:
6.0(2)A4(5.70), 6.0(2)A4(6), 6.0(2)A6(2.46), 6.0(2)A6(3), 6.0(2)U4(4.70), 6.0(2)U4(5), 6.0(2)U6(1.46), 6.0(2)U6(2)
Bug Id:
CSCur05529
Title:
Nexus 3000/3500 evaluation for CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
The Cisco Nexus 3000/3500 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.

Conditions:
A user must first successfully log in and authenticate via SSH to trigger this vulnerability.

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A3(3.80), 6.0(2)A3(4), 6.0(2)A5(0.918), 6.0(2)A5(1), 6.0(2)U3(3.80), 6.0(2)U3(4), 6.0(2)U5(0.918), 6.0(2)U5(1)
Bug Id:
CSCur28178
Title:
Nexus3000/3500: evaluation of SSLv3 POODLE vulnerability
Description:



Symptom:

This product includes a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

This bug has been opened to address the potential impact on this product.



Conditions:


Web based HTTPS interface is provided in Nexus 3000 only when "feature nxapi" is enabled.
This feature support came in from 6.0(2)U4(1) onwards, and is disabled by default.
When this feature is not enabled, Nexus 3000 is not vulerable.



Workaround:


Disable 'feature nxapi' if enabled.

Will be fixed in following release:

6.0(2)U4(2) - goa MR1



Further Problem Description:



PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)U4(1)
Known Fixed Releases:
6.0(2)A4(1.26), 6.0(2)A4(2), 6.0(2)A5(0.946), 6.0(2)A5(0.947), 6.0(2)A5(1), 6.0(2)U4(1.26), 6.0(2)U4(2), 6.0(2)U5(0.946), 6.0(2)U5(0.947), 6.0(2)U5(1)
Bug Id:
CSCuu14692
Title:
N3500: MTC_USD Crash observed when Active buffer monitor is cleared
Description:

Symptom:
MTC_USD process core happens when active buffer monitor cli's are issued.

Conditions:
When "show hardware profile buffer monitor multicast 1 detail" is executed from multiple telnet sessions, we get into mtc_usd process core.

Workaround:
NA

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A4(4)
Known Fixed Releases:
6.0(2)A4(5.49), 6.0(2)A4(6), 6.0(2)A6(2.25), 6.0(2)A6(3), 6.0(2)U4(4.49), 6.0(2)U4(5), 6.0(2)U6(1.25), 6.0(2)U6(2)
Bug Id:
CSCus89127
Title:
Disabling ptp on one interface breaks ptp on many other interfaces.
Description:

Symptom:
When a change is performed on one of the interfaces on a Cisco Nexus 3000, which affects PTP on this interface, it may affect PTP on other interfaces on this switch.

Conditions:
This issue occurs when PTP is enabled on interfaces

Workaround:
Restart PTP on other affected interfaces by:
no ptp
ptp

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.0(2)A3(1), 6.0(2)A4(3), 6.0(2)A6(0.77)
Known Fixed Releases:
6.0(2)A4(5.47), 6.0(2)A4(5.53), 6.0(2)A4(6), 6.0(2)A6(0.80), 6.0(2)A6(1), 6.0(2)A6(2.28), 6.0(2)A6(3), 6.0(2)U4(4.47), 6.0(2)U4(4.53), 6.0(2)U4(5)
Bug Id:
CSCut86141
Title:
SFP-H10GB-CU2.255M, hardware type changed to No-Transceiver on N3k
Description:

Symptom:
SFP not detected on the ports. The same SFP works on other ports

Conditions:
interface remain down with following error
%ETHPORT-5-IF_HARDWARE: Interface Ethernet1/30, hardware type changed to No-Transceiver

in the bcm_shell interface shows FAUTL remote

bcm-shell.0> port 8
PORT: Status (* indicates PHY link up)
xe7 LS(SW) Forced(10GFD) STP(Disable) Lrn(ARL,FWD) UtPri(0) Pfm(FloodNone) IF(SFI) Max_frame(1518) MDIX(ForcedNormal, Normal) Medium(Copper) Fault(Remote) VLANFILTER(3)

Workaround:
power drain of the switch seems to be recovering the issue some times

Further Problem Description:
In the problem state it seems that the driver is saturated due to larger value of idrv, predrv SI values. Updating the new set of SI setting solves the issue.


Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(2)U5(0.37)
Known Fixed Releases:
6.0(2)A6(2.45), 6.0(2)A6(3), 6.0(2)U6(1.45), 6.0(2)U6(2)
Bug Id:
CSCuu54126
Title:
10g SFP not working/detected on Nexus 3K in port E1/1
Description:

Symptom:
- 10g SFP not working/detected on Nexus 3K in port E1/1 and same SFP works on other switch ports

Conditions:
- issue found in code : 6.0(2)U2(6)
- Interface status remains down

etaccsw17.wsf.prnynj# sho int ethernet 1/1

Ethernet1/1 is down (Link not connected)

Dedicated Interface

Hardware: 100/1000/10000 Ethernet, address: 885a.9237.2228 (bia 885a.9237.2228)

Description: [CISCO][WIFI][OUTDOOR] wc101.wsf.prnynj [8510] PORT 02

MTU 1500 bytes, BW 10000000 Kbit, DLY 10 usec

reliability 255/255, txload 1/255, rxload 1/255

- Transceiver status show present

sdeaccsw17.wsf.prnynj# sho int ethernet 1/1 transceiver details

Ethernet1/1

transceiver is present >>>>

type is 10Gbase-LR

name is CISCO-FINISAR

part number is FTLX1474D3BCL-CS

- bcm_shell status of interface shows no error only stp in blocking state which seems to be expected behavior as interface is down.
bcm-shell.0> port 1

PORT: Status (* indicates PHY link up)

*xe0 LS(SW) Forced(10GFD) STP(Block) Lrn(ARL,FWD) UtPri(0) Pfm(FloodNone) IF(SFI) Max_frame(1518) MDIX(ForcedNormal, Normal) Medium(Copper) VLANFILTER(3)

Workaround:
Reload the switch

Further Problem Description:
In the problem state it seems that the driver is saturated due to larger value of idrv, predrv SI values. Updating the new set of SI setting solves the issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(2)U2(5.87)
Known Fixed Releases:
6.0(2)A6(2.45), 6.0(2)A6(3), 6.0(2)U6(1.45), 6.0(2)U6(2)
Bug Id:
CSCuu28210
Title:
memory leak in PIM SLAB
Description:

Symptom:
On a Nexus 3500 switch multicast traffic might stop forwarding for specific groups/sources.

Conditions:
The following messages are seen in the syslog:
%PIM-3-SLAB_ALLOC: pim [3665] Slab alloc of type pim_routetype failed in pim_build_pim_route()
%PIM-3-CREATE_ROUTE: pim [3665] Couldn't create PIM route for (A.B.C.D/32, E.F.G.H/32) in pim_add_oif_to_sources_walk()

Also, memory allocation for PIM can be seen increasing using the following command:
show ip pim internal mem-stats detail | grep -i "grand total"

Workaround:
Reload the device to clear the memory allocation.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
6.0(2)A3(2.55)
Known Fixed Releases:
Bug Id:
CSCue06196
Title:
copy r s timedout after setting bootvariables
Description:

Symptom:
On Nexus 3000 switch, copy run start might time out.

Following messages can be seen:

%SYSMGR-3-CFGWRITE_FAILED: Configuration copy failed (error-id 0x401E004D).

Conditions:
The problem could happen in scenarios where a script which executes the following

show run

copy run start

copy run tftp

is run on the switch multiple times.

Workaround:
do not perform the above commands multiple times on the switch.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
5.0(3)U3(2), 5.0(3)U5(1d), 6.0(2)U1(1)
Known Fixed Releases:
5.0(3)U5(1e), 6.0(2)A1(1), 6.0(2)U1(1)
Bug Id:
CSCuh87973
Title:
LLDP crash on N3k
Description:

Symptom:
A nexus 3k may see an lldp process crash when polled via snmp.

Conditions:
when snmp polling the switch wihtout mgmt ip configured.

Workaround:
two possible workaround:

1. configure an IP address on management interface (even if its shut down)

2. add "no snmp-server load-mib lldpsnmp" to running-config

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.0(2)A1(1)
Known Fixed Releases:
6.0(2)A1(1b), 6.0(2)U1(1b), 6.0(2)U1(2), 6.0(2)U2(1), 6.0(2)U2(1.44), 6.0(2)U2(2Z)
Bug Id:
CSCuv03416
Title:
ipfib crash after bulk ucast and mcast update
Description:

Symptom:
ipfib crash after bulk ucast and mcast update

Conditions:
bulk mcast and uncast update

Workaround:
n/a

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
6.0(2)U4(1), 6.0(2)U4(1M)
Known Fixed Releases:
Bug Id:
CSCut43397
Title:
Nexus 3000 and 3500 (N3K and N3500K) Leap Second
Description:

Symptom:
When the leap second update occurs a N3K could have the kernel hit what is known a "livelock" condition under the following circumstances:

a. When the NTP server pushes the update to the N3K NTPd client, which in turn schedules the update to
the Kernel. This push should have happened 24 hours before June 30th, by most NTP servers.

b. When the NTP server actually updates the clock

Conditions:
The leap second update will be propagated via Network Time Protocol (NTP) or via manually setting the clock.

Workaround:
On switches running affected code, following workaround can be used.

1)Remove NTP/PTP configuration on the switch at least two days prior to June 30, 2015 Leap second event date.
2)Add NTP/PTP configuration back on the switch after the Leap second event date(July 1, 2015)

Further Problem Description:
The following releases and above are not affected by this issue:

6.0(2)U3(1)
6.0(2)U2(2Z)
6.0(2)U2(1)
6.0(2)U1(1)
6.0(2)A1(1b)

- The last leap second update happened on June 30th @ 23:59:60 UTC.

- The next leap second update is not due until next several years, and 6 months notice will be given before the update. Please see URL below for leap second update details.

Reference : http://www.timeanddate.com/time/leapseconds.html

- Now that we have past June 30th 23:59:60 UTC, if your N3K have not reset or switched over, you are not affected this caveat until the next leap second update.

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.0(2)U1(1)
Known Fixed Releases:
6.0(2)A1(2d), 6.0(2)U2(1), 6.0(2)U2(2Z), 6.0(2)U3(1)
Bug Id:
CSCuu18724
Title:
N3k MTS memory leak caused snmpd process to crashes multiple times
Description:

Symptom:
snmpd process crashes

2015 Apr 29 15:00:33.104 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904027] mts_is_q_space_available_haslock_old():2013: regular+fast mesg total = 46388, soft limit = 1024 - kernel
2015 Apr 29 15:00:33.106 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904034] mts_is_q_space_available_haslock_old(): NO SPACE - node=4, sap=27, uuid=26, pid=19086, sap_opt = 0x1, hdr_opt = 0x0, rq=46388(27966872), lq=0(0), pq=0(0), nq=0(0), sq=0(0), fast: rq=0, lq=0, pq=0, nq=0, sq=0 - kernel
2015 Apr 29 15:00:33.108 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904040] mts_print_longest_queue_state: opcode counts for first and last 50 messages in recv_q of sap 27: - kernel
2015 Apr 29 15:00:33.111 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904048] mts_print_msg_opcode_in_queue: opcode 2832 - 100 messages - kernel
2015 Apr 29 15:00:33.113 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:32 %KERN-2-SYSTEM_MSG: [538326.904051] mts_do_msg_input() failing since no space available in 27 (src_sap = 27, opc = 325) - kernel
2015 Apr 29 15:00:52.241 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:52 %KERN-2-SYSTEM_MSG: [538346.023794] [sap 27][pid 19086][comm:snmpd] QFULL drop notify posted - kernel
2015 Apr 29 15:00:52.244 nttcom-tyo4 %$ VDC-1 %$ 29 15:00:52 %KERN-2-SYSTEM_MSG: [538346.031952] [sap 27][pid 19086][comm:snmpd] sap recovering failed and so Killed - kernel
2015 Apr 29 15:00:53.034 nttcom-tyo4 %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 19086) hasn't caught signal 6 (core will be saved).
2015 Apr 29 15:03:53.855 nttcom-tyo4 %$ VDC-1 %$ %SYSMGR-2-CORE_SAVE_FAILED: core_client_main: PID 24943 with message command /isan/bin/sysmgr_logmgr /var/sysmgr/tmp_logs 0 1>> /var/sysmgr/core_handling.log failed for srv , ret = 2 .
nttcom-tyo4#

Conditions:
normal operation

Workaround:
unknown at this point

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.0(2)U5(1)
Known Fixed Releases:
Bug Id:
CSCut14215
Title:
Upon startup, N3K Sets CoPP Police PPS 0 for multiple class-maps
Description:

Symptom:
PPS values for few or all class-maps are 0.

Conditions:
This is seen only if user gives ctrl+C when the setup is in progress during bootup. If user does not give ctrl+C, then this scenario will not occur

Workaround:
Run "setup" again from CLI explicitly and make sure that it runs to completion.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
6.0(2)U2(2)
Known Fixed Releases:
6.0(2)A6(1.115), 6.0(2)A6(2), 6.0(2)U6(0.115), 6.0(2)U6(1)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论