Cisco Blog » The Platform

2015年8月1日星期六

Cisco Notification Alert -Nexus 9000 Series Switch-01-Aug-2015 16:53 GMT

 

 

 

 

 

 

 


Security Advisories & Responses for Nexus 9000 Series Switches

Title:
Cisco Application Policy Infrastructure Controller Access Control Vulnerability
Description:

A vulnerability in the cluster management configuration of the Cisco Application Policy Infrastructure Controller (APIC) and the Cisco Nexus 9000 Series ACI Mode Switch could allow an authenticated, remote attacker to access the APIC as the root user. The vulnerability is due to improper implementation of access controls in the APIC filesystem. An attacker could exploit this vulnerability by accessing the cluster management configuration of the APIC. An exploit could allow the attacker to gain access to the APIC as the root user and perform root-level commands. Cisco has released software updates that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic

Date:
22-JUL-2015

Find additional information in Cisco Security Advisories & Responses

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9504 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396PX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9332PQ Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9396TX Switch
Software Type:
NX-OS Software Maintenance Upgrades (SMU)
Release Version:
7.0(3)I1(1b)
Alert Type:
New File
File Name:
n9000-dk9.7.0.3.I1.1b.CSCuv18880.bin
File Description:

Floating IP patch

File Release Date:
22-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9336PQ ACI Spine Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.0(3o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.0.3o.iso
File Description:

Release Image for 1.0(3o)

File Release Date:
09-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.0.3o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Release 11.0(3o)

File Release Date:
09-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9508 Switch
Software Type:
NX-OS System Software
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-dk9.6.1.2.I3.4b.bin
File Description:

Cisco Nexus 9000 Standalone Switch

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9372PX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 93128TX Switch
Software Type:
NX-OS EPLD Updates
Release Version:
6.1(2)I3(4b)
Alert Type:
New File
File Name:
n9000-epld.6.1.2.I3.4b.img
File Description:

Nexus 9000 Standalone switch EPLD Image for 6.1(2)I3(4b)

File Release Date:
02-JUL-2015
Find additional information in Software Downloads index.

Software Updates for Nexus 9000 Series Switches

Product Name:
Nexus 9516 Switch
Software Type:
NX-OS System Software-ACI
Release Version:
11.1(1o)
Alert Type:
New File
File Name:
aci-apic-dk9.1.1.1o.iso
File Description:

APIC image for 1.1(1o) release

File Release Date:
21-JUL-2015
Alert Type:
New File
File Name:
aci-n9000-dk9.11.1.1o.bin
File Description:

Cisco Nexus 9000 Series ACI Mode Switch Software Release 11.1(1o)

File Release Date:
21-JUL-2015
Find additional information in Software Downloads index.

Known Bugs - Nexus 9000 Series Switches

Bug Id:
CSCuu40526
Title:
N9k:Fexqos Clear qos stats not clearing the counters
Description:

Symptom:
Clearing queuing statistics for FEX host interfaces is not supported

Conditions:
when user attempts to clear queueing statistics using "clear qos statistics" command , counters will not be reset to zero

Workaround:
No workaround. Two snapshots of the cli can be taken and difference of the counters will give same information
1) clear qos statistics followed by
2) show queuing interface

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.0(3)I2(0.307)
Known Fixed Releases:
Bug Id:
CSCuq77485
Title:
RBAC Security not working for health score
Description:

Symptoms:

A vulnerability in the role-based access control (RBAC) of the Cisco Application Policy Infrastructure Controller (Cisco APIC) could allow an
authenticated, remote attacker to have ''read'' access to certain information stored in the affected system .

The vulnerability is due to improper handling of role-based access control (RBAC) for health scoring. An attacker could exploit this
vulnerability by gaining access to information that they should not be able to.

Conditions:
Devices running an affected version of 1.0(1e).

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.5/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C
CVE ID has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
1.0(1.110a)
Known Fixed Releases:
1.0(1.156a), 1.0(1.172), 1.0(2j), 1.1(0.319), 1.1(1j)
Bug Id:
CSCut25121
Title:
OSPF crash seen while executing "show ip ospf router" command
Description:

Symptom:
OSPFv2 crashes

Conditions:
If routes are churning when "show ip ospf route" is issued, OSPFv2 may crash.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUL-2015
Known Affected Releases:
7.0(3)I1(1.124), 7.0(3)I1(2)
Known Fixed Releases:
7.0(0)HSK(0.433), 7.0(3)I1(1.140), 7.0(3)I1(2), 7.0(3)IEF1(2), 7.0(3)IEF1(2.7), 7.0(3)IX1(1.93), 7.0(3)IX1(2), 7.1(0)AV(0.74), 7.1(0)ES(0.18), 7.1(0)IB(120)
Bug Id:
CSCut77413
Title:
APRIL 2015 NTPd Vulnerabilities
Description:


Symptom:This product includes a version of ntpd that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798 and CVE-2015-1799



Conditions:Device configured with NTP and NTP Key authentication.

ntp authenticate
ntp authentication-key 1234 md5 104D000A0618 7
ntp trusted-key 1234

ntp peer 1.2.3.4 key 1234

Affected version: 7.0(3)I1(1)

Fixed version: 7.0(3)I1(2) estimated CCO date 4/30/2015

Workaround:Not available.

More Info:PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
6.1(2)I3(3a)
Known Fixed Releases:
7.0(3)I1(1.211), 7.0(3)I1(1.213), 7.0(3)I1(2), 7.0(3)ISH1(2), 7.0(3)ISH1(2.13), 7.0(3)ITI2(1), 7.0(3)ITI2(1.6), 7.0(3)IX1(1.93), 7.0(3)IX1(2), 8.3(0)CV(0.72)
Bug Id:
CSCut07151
Title:
VxLAN EVPN DHCP Offer not sent to client
Description:

Symptom:
DHCP fails when client and server are on VXLAN VRF

Conditions:
Client is connected to a leaf switch and the DHCP server is connected to another switch (VTEP) in the topology.
Issue is not seen when client and server is on the same switch.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUL-2015
Known Affected Releases:
7.0(3)I1(0.269), 7.0(3)I1(1)
Known Fixed Releases:
7.0(3)I1(1a), 8.3(0)CV(0.72)
Bug Id:
CSCuu83343
Title:
Evaluation of fabric-apic for OpenSSL June 2015
Description:


Symptom:

This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176

This bug has been opened to address the potential impact on this product.


Conditions:


Exposure is not configuration dependent.


Workaround:


Not available.




More Info:




PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.8/6.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html


Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUL-2015
Known Affected Releases:
1.0(4j)
Known Fixed Releases:
Bug Id:
CSCuu79056
Title:
OSPF Process Leaks Memory with table-map configuration
Description:

Symptom:
Memory leak can be seen in Nexus 9000 switch while running ospf. This issue is related to presence of table-map in the configuration. The leak in ospf process occurs in librpm_dll.so libraries.

Conditions:
The leak seems to occur whenever there's an SPF run/topology updates, and the size of the leak increases with the size of the OSPF area. The memory leaks happens due to the presence of table-map configuration within ospf.

Workaround:
remove table-map command from ospf configuration. This should prevent the memory in ospf process from increasing. To completely free the holding memory please clear the ospf process using clear ip ospf neighbor *

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUL-2015
Known Affected Releases:
7.3(0)ZN(0.3)
Known Fixed Releases:
6.1(2)I3(4b), 7.0(3)I2(0.381), 7.0(3)I2(1), 8.3(0)CV(0.72)
Bug Id:
CSCuu36916
Title:
ACI : ARP storm on l3out blocks ARP reponses to infra pool
Description:

Symptoms:
The iStack does not provide adequately process a large volume of ARP messages and puts the processing to the CPU. This can cause the system to
appear to become unresponsive during an ARP-storm. The system will recover when the ARP-storm passes.

<B>Symptom:</B>
APIC unable to resolve ARP requests when there are a large number of ARP messages.

<B>Conditions:</B>
A large number of ARP messages must be present on the VLAN.

<B>Workaround:</B>
None

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.3/2.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUL-2015
Known Affected Releases:
11.0(3f), 11.0(4)
Known Fixed Releases:
1.1(0.902a), 1.1(0.904), 1.1(1j), 1.1(2.24), 11.1(0.220)
Bug Id:
CSCut56520
Title:
Support Compat check for PV mappings in vpc scenario
Description:

Symptom:
The wrong PV mapping configuration will not be detected across vPC links.

Conditions:
When PV mapping is not configured properly on vPC, the links are not brought down.

Workaround:
None. The configuration should be cross checked manually.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
7.0(3)I1(1.136), 7.0(3)I1(1.156), 7.0(3)I2(0.406)
Known Fixed Releases:
7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.424), 7.0(3)I2(1)
Bug Id:
CSCur63227
Title:
Traffic drop for BGP RNH routes during switchover
Description:

Symptom:
Temporary traffic loss during switchover

Conditions:
When BGP prefixes have the Nexthop learnt over BGP itself and in the presence of a default route in the system then during switchover BGP prefixes can have some temporary traffic drop. This will get fixed up after BGP convergence is done post switchover.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.1(2)I3(1.53)
Known Fixed Releases:
7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I1(0.185), 7.0(3)I1(0.190), 7.0(3)I1(0.225), 7.0(3)I1(1), 7.0(3)I1(1.20), 7.0(3)I1(1.214), 7.0(3)I1(1.216), 7.0(3)I1(2)
Bug Id:
CSCuu58251
Title:
Missing HSRP VIP v6 link-local after reload of both HSRP routers
Description:

Symptom:
The HSRP VIP v6 link-local address of the SVI is missing in the output of "show ipv6 interface vlan x". As a result v6 hosts will not learn the RA messages from the router.

Conditions:
Reload of HSRP routers at the same time.

Workaround:
Remove the HSRP v6 configuration from the affected SVI and re-add.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
6.1(2)I1(3.4)
Known Fixed Releases:
7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.428), 7.0(3)I2(1)
Bug Id:
CSCuu62942
Title:
N9K3: ARP packet not forwarded on FEX with DAI
Description:

Symptom:
ARP reply is not forwarded on FEX host interface

Conditions:
- DAI is enabled
- Host is connected on FEX

Workaround:
- Connect host to parent switch
OR
- Disable DAI

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUL-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases:
7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.439), 7.0(3)I2(0.449), 7.0(3)I2(1)
Bug Id:
CSCuu21167
Title:
Policymgr is non-responsive for any new policy update after upgrade
Description:

Symptom:
Policymgr is non-responsive for any new policy update and times out with error after upgrade from a prior version to 104h

Conditions:
vnsRsLIfCtxToBD (Device selection policy) relation from non-common tenant pointing to Bridge Domain (BD) in tenant common was created in a lower version and Policy-based upgrade was done from lower version to 104h

Workaround:
Please run the script cleanupRsLIfCtxToBD.py "after upgrade" by pointing it at your APIC ip address. Script can be obtained from AS folks or attached to this bug. To run the command you will need to set the PYTHONPATH pointing to egg files of the specific version. You will need python 2.7

PYTHONPATH=/tmp/867h/acicobra-1.1_0.867h-py2.7.egg:/tmp/867h/acimodel-1.1_0.867h-py2.7.egg /opt/cisco/aci/python2.7/bin/python cleanupRsLIfCtxToBD.py -H -P 443 -u admin -p -S

This script will delete and readd all the vnsRsLIfCtxToBD relations in your system. GraphInst might go to fault state and recover but no traffic disruption is expected.

After running the script, monitor the CPU utilization of PolicyMgr process to ensure it doesn't stay at a high value for sustained period of time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(4)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus83690
Title:
NTP prov config not getting pushed after leaf stateful reload 145a image
Description:

Symptom:
NTP provider configuration may get removed from switch after stateful reload

Conditions:
This can happen after a switch reboot

Workaround:
Disassociate / reassociate the pod group to the date time policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
11.1(0.145)
Known Fixed Releases:
1.0(3.34), 1.1(0.668), 1.1(1j), 1.2(0.1), 2.0(0.2)
Bug Id:
CSCut56623
Title:
When dscp is set at l3Out level, it is not pushed to the rules
Description:

Symptom:
When a Layer 3 external network is configured with DSCP marking, it is not copied to a filter rule on the node.

Conditions:
Configure Dscp marking is l3Out level.

Workaround:
To work around the issue configure dscp marking at l3Out instance (l3extInstP)

Further Problem Description:
NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.766d)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut30212
Title:
Config Import: "All requests to shard 4 timed out" policymgr crash
Description:

Symptom:
When doing a config import, you will see parts of the import work, but it will overall never finish. In the Operational tab of the import, the process will continuously run until it spits out the error:

"All requests to shard 4 timed out"

Conditions:
config import on 1.1 in listed versions

Workaround:
Need to downgrade to get import to work or upgrade to fixed release

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.726c), 1.1(0.735b)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut56639
Title:
dscp marking not happening for AEpg to l3instP rule
Description:

Symptom:
When dscp marking is configured on external Epg, it is not copied to filter rule on node.

Conditions:
Configure external Epg with dscp marking.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.766d)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu27351
Title:
Unable to change the PN to 'Unenforced'
Description:

Symptom:
Command fails with error "Configuration is invalid due to GraphInst does not have any configuration parameters" after a policy based upgrade.

Conditions:
Policy-based upgrade was done from 867d or earlier image to a latter version

Workaround:
Please run the script cleanupRsLIfCtxToBD.py by pointing it at your APIC ip address. Script can be obtained from AS folks

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.867b), 1.1(0.872a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut46796
Title:
zoning-rule missing when 0/0 and particular subnet present in an l3out
Description:

Symptom:
The zoning-rule is missing after deleting or adding 0/0 and/or a particular subnet present in a Layer 3 external network.

Conditions:
0/0 subnet was present and a particular subnet is added or particular subnet was present and 0/0 subnet was added

Workaround:
Re-create the the l3out

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.750a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut19696
Title:
PM core on 2 IFCs after posting config
Description:

Symptom:
The policy manager cores on 2 IFCs after posting a configuration.

Conditions:
This may happen during upgrade from an older release and if a message with unknown config is received.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.706a), 1.1(0.766m)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut45754
Title:
VC upgrade cause recurring soap error on APIC from vshpere - Cisco IT
Description:

Symptom:
Post vCenter upgrade, the APIC was not able to collect inventory or start event listener. As a result, vCenter port group objects were not created. On the APIC, we saw a lot of recurring SOAP timeout errors returned by vSphere APIs while trying to pull inventory as well when trying to create event collector.

Conditions:

Workaround:
We restarted vmmmgr process on APIC and vcenter inventory pull and event listener got created successfully.

Further Problem Description:
APIC attempts to retry inventory or event collector creation failures on continuous basis and they were some clean up issues on APIC/soap-client client sidewhich could have lead to further soap error. These cleanup issues are fixed as part of this bugfix.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(3i)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu40110
Title:
Fex not coming up with fabric L2 mtu size change
Description:

Symptom:
FEX not coming up.

Conditions:
Fabric MTU is set below 1500.

Workaround:
Don't set fabric MTU below 1500.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.890a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut02297
Title:
AVS opflexODev mo - tunnel interface not removed on ileaf, remains stale
Description:



Symptom:
Fault F0214 with severity Major observed with description similar to: "Operational issues detected for OpFlex device: 175192220 0.0.0.0 for logical switch comp/prov-VMware/ctrlr-[Company-AVS]-Company-vcenter01/sw-dvs-65500 detected, error: [Invalid dvs name]"

Conditions:
AVS is used within fabric and moved from one port to another.

Workaround:
Contact TAC to remove stale opflexODev object.

Further Problem Description:



(release notes added by addprefcs-org.ksh)

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(3f), 1.1(0.694a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut70441
Title:
AVS-SCALE: assert in the object store infra leads to vleaf elem core
Description:

Symptom:
The VTEP tunnel is not present on the leaf.

Conditions:
AVS host reconnect.

Workaround:
vem restart on the AVS host.

Further Problem Description:
On an AVS host reconnect, the heartbeat counter for that device in opflexODev on the leaf gets reset to 0 without the expect heartbeat counter getting reset. This is causing the heartbeat check to mistakenly think that it was missing heartbeats.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.784)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu58397
Title:
scripthandler memory usage is linearly increasing
Description:

Symptom:
The memory usage of scripthandler keeps increasing. This should happen only when L4L7 device packages are used in the APIC. The issue specifically happens when a device package is removed and installed again.

Conditions:
This issue does not happen every time a device package is removed and installed. There is a timing element to this and the issue is seen only when multiple conditions occur together.

Workaround:
Delete the L4L7 device package and install them again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.912a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut60986
Title:
Missing fvCEp after upgraded to 766j image
Description:

Symptom:
Endpoints are not reported after leaf is upgraded.

Conditions:
This can happen if traceroute for endpoints on that leaf is configured at the time that leaf is upgraded or clean rebooted.

Workaround:
Unconfigure traceroute configuration to endpoints on a leaf prior to doing either policy upgrade or clean reboot of that leaf. Otherwise, user will need to export configuration, clean reboot the apics, and re-import configuration

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.766j)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu06634
Title:
Enable func type option for LDev in Device wizard
Description:

Symptom:
The package is device only supports go throught. However when user create a service graph using those package devices, those device's mode becomes go to.

That was the bug which has already been resolved.

Conditions:
N/A

Workaround:
Do not need workarounds. Already fixed.

Further Problem Description:
No futhere problem

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(4l), 1.1(0.839a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu79239
Title:
core on ifc_reader - error cannot create or open DB ~/ifc_policymgr.db
Description:

Symptom:
APICs cored on the ifc_reader process with a error (Server error cannot create or open DB: var/run/mgmt/db/ifc_policymgr/S32_R1/ifc_policymgr.db) being displayed in the GUI anytime a policy is clicked on.

Conditions:
APICs core and lose connectivity to one another. APIC's believe they're fully fit but no longer have the one of the other APICs in topology.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(3f)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut62151
Title:
After delete, re-add config subnets are not leaked into Cons VRF
Description:

Symptom:
The consumer endpoint group in one private network (fvCtx) is not able to communicate with service node in another private network (fvCtx) after deleting and re-adding the service graph from the contract.

Conditions:
The communication of the consumer endpoint group and the service node across the private networks requires route leaking the service node subnet to the consumer VRF. When deleting then re-adding the graph to the contract, the route leaking does not occur, which causes communication failure.

Workaround:
On the Bridge Domain (fv::BD class) attached with the graph, flap the "unicastRoute" property.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.766k)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut46858
Title:
ifav41 : Core Found - node: 1201 Service Name: nginx - ifav41-spine121
Description:

Symptom:
Nginx web server may dump core and restart if stats that are not supported in a downgraded image are queried after a downgrade to that image.

Conditions:
ACI is downgraded from 1.1(1*) image to 1.0(4*) or lower version and then a stats query is made
for an object that is present in 1.1(1*) image but not in 1.0(4*) image.

Workaround:
Query only the stats that are supported in an image.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.750d), 1.1(1j)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut36428
Title:
End Point Attachment Issues with Multiple Service Graphs
Description:

Symptom:
End point attachment notification 1) does not always result in attachment notification, or 2) attachment notification is only sent to a subset of deployed service graph instances, or 3) attachment notification is sent to the incorrect service graph instance.

Conditions:
- ACI L4-L7 device package integration
- Attachment Notification enabled for service graph template(s)
- Multiple service graph instances are deployed

Workaround:
Use static end point attachment using params

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(3i), 1.1(0.737a)
Known Fixed Releases:
1.1
Bug Id:
CSCut56615
Title:
vmm FSM failed in scale setup
Description:

Symptom:
Slow convergence of port group updates and VM placements for the DVS/AVS switch created by APIC at the vCenter

Conditions:
This problem may occur in large scale setups when a very large volume of vCenter tasks are initiated by the APIC.

Workaround:
Reloading the APIC may recover the system.
In case convergence is still slow after the reload, and if a very large number of EPGs are associated with the VMM domain, removing those associations and adding them back in small batches should help.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.768c)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus83262
Title:
Backend returned an unparsable response due to no input validation
Description:

Symptom:
When configuring LDAP Providers and using special characters you may run into the following error.

"Server Error backend returned unparsable response"

This was using LDAP provider with the hostname 1.1.1.1

Conditions:

Workaround:
You can find this under Admin>AAA>LDAP Management then you right click and Save As

You will need to save the LDAP Management configuration based on:

Content: All Properties
Scope:Subtree
Export Format: XML or JSON

CLI using the API

It would look something like this where you would change the 1.1.1.1 to the IP or DNS name.

admin@apic1:~> icurl -u admin:password -X "DELETE" http://a.p.i.c/api/node/mo/uni/userext/ldapext/ldapprovider-1.1.1.1.json
{"imdata":[]}

API

URL using an HTTP Delete using POSTMAN or some other REST Client

http://a.p.i.c/api/node/mo/uni/userext/ldapext/ldapprovider-1.1.1.1.json

Further Problem Description:
The key thing to check is the higher container folder to pull down all configuration since you will not be able to pull it down by sub folder.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(2m), 1.1(0.644b)
Known Fixed Releases:
1.0(3.15), 1.0(3.34), 1.0(3h), 1.1(0.662a), 1.1(0.667), 1.1(1j), 1.2(0.1), 2.0(0.2)
Bug Id:
CSCut13651
Title:
APIC NTP security vulnerability
Description:

Symptoms:
The Cisco Fabric Application Policy Infrastructure Controller (APIC) includes a
version of Network Time Protocol Daemon (NTPD) that is affected by the
vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2013-5211

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2013-5211 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.696a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu05227
Title:
vxlan tunnels removed when ports are removed/added into pc config
Description:

Symptom:
VXLAN tunnels are removed when ports are removed/added into the PC configuration.

Conditions:

Workaround:
vem restart

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(3.46a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu45269
Title:
[Tib Fex]: policyelem core observed during fex hw regression
Description:

Symptom:

Conditions:

Workaround:

Further Problem Description:
Program terminated with signal 11, Segmentation fault.
#0 0xf70d76ed in nw::PathEpBI::getFabricPathEpDnFromNwPathEpDn(mo::DnBuffer const&, mo::DnBuffer&, bool) () from /isan/lib/libsvc_ifc_policyelem.so
(gdb) bt
#0 0xf70d76ed in nw::PathEpBI::getFabricPathEpDnFromNwPathEpDn(mo::DnBuffer const&, mo::DnBuffer&, bool) () from /isan/lib/libsvc_ifc_policyelem.so
#1 0xf6eb59f2 in ifc_policyelem::Svc::taskNwPathEpUpdatePathEpContextFormatCb(meta::ActionHandler const*, mo::Mo*, mo::Mo*) () from /isan/lib/libsvc_ifc_policyelem.so
#2 0xf6831475 in meta::TaskHandler::trigger(mo::Mo*, mo::Mo&, bool) const () from /isan/lib/libcore.so
#3 0xf68352f1 in meta::TaskHandler::trigger(mo::Mo&, unsigned int) () from /isan/lib/libcore.so
#4 0xf70d93a0 in nw::PathEpBI::postExplicitCb(mo::Mo&) const () from /isan/lib/libsvc_ifc_policyelem.so
#5 0xf674f2b8 in ?? () from /isan/lib/libcore.so
#6 0xf6758a92 in mo::Changer::processObjects(void (*)(mo::Mo*), bool, proc::Transactor::State) const () from /isan/lib/libcore.so
#7 0xf674db8a in mo::Transactor::explicitEndCb() () from /isan/lib/libcore.so
#8 0xf67cfd9b in proc::Doer::bulk(std::vector >&) () from /isan/lib/libcore.so
#9 0xf67d0d3c in proc::Doer::tryBulk(std::vector >&) () from /isan/lib/libcore.so
#10 0xf67d0f61 in proc::Doer::process(std::vector >&) () from /isan/lib/libcore.so
#11 0xf67d21b2 in proc::Doer::react(std::array const&, unsigned int) () from /isan/lib/libcore.so
#12 0xf66f953c in core_queue::BsqReader::process(core_queue::BatchServiceQueue&, unsigned char) () from /isan/lib/libcore.so
#13 0xf66f02bc in core_queue::BatchServiceQueue::consume(unsigned char) () from /isan/lib/libcore.so
#14 0xf66ef54e in boost::asio::detail::completion_handler, unsigned char>, boost::_bi::list2*>, boost::_bi::value > > >::do_complete(boost::asio::detail::task_io_service*, boost::asio::detail::task_io_service_operation*, boost::system::error_code const&, unsigned int) ()
from /isan/lib/libcore.so
#15 0xf62f087f in boost::asio::detail::strand_service::do_complete(boost::asio::detail::task_io_service*, boost::asio::detail::task_io_service_operation*, boost::system::error_code const&, unsigned int) () from /isan/lib/libosiris.so
#16 0xf62ee836 in boost::asio::detail::task_io_service::run(boost::system::error_code&) () from /isan/lib/libosiris.so
#17 0xf62eac66 in core_thread::WorkDispatcher::onThreadCreation() () from /isan/lib/libosiris.so
#18 0xf62ec40d in boost::detail::thread_data, boost::_bi::list1 > > >::run() () from /isan/lib/libosiris.so
#19 0xf2dd58ec in ?? () from /usr/lib/libboost_thread.so.1.49.0
#20 0xf2db69ab in start_thread (arg=0xf11cfb40) at pthread_create.c:309
#21 0xf2ad

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.902a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus82518
Title:
QBranch: DHCP traffic impact due to missing mcast address in EPG
Description:

Symptom:
Flood towards the ESX for VXLAN port groups will not work.

Conditions:
The mcast address for a VXLAN endpoint group on the leaf is programmed with 0 (Seen in 1.0(2j)).

Workaround:
After verifying that compEpPD has the mcast addr filled in itdetach and reattach EPs on that EPG in that domain

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(2j)
Known Fixed Releases:
1.0(3.15), 1.0(3.34), 1.0(3e), 1.0(3f), 1.1(0.667), 1.1(1j), 1.2(0.1), 2.0(0.2)
Bug Id:
CSCut02482
Title:
ipfib core after upgrading and posting graph config
Description:

Symptom:
The process ipfib crashes on the leaf.

Conditions:
For this to occur, ALL of the following conditions must be met:
- An external Layer 3 endpoint group (EPG) is providing/consuming a contract that makes it talk with another EPG in a different VRF.
- And that external Layer 3 EPG is also providing/consuming a contract that makes it talk with another EPG in the same VRF.
- That external Layer 3 EPG has a user configured static route in it.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
11.1(0.152)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut57196
Title:
TaskQ is stuck at 41 entries and with failures in getting TaskList info
Description:

Symptom:
APIC does not clean up state for some vCenter tasks it initiated. As a result, APIC may not be able to process new tasks as fast as it does under normal conditions.

Conditions:
APIC verifies the status of tasks it has initiated at vCenter to ensure they have completed. When vCenter does not report status for some of these tasks, they are never cleaned up at APIC. This results in lowering the limit of maximum new outstanding tasks that APIC can trigger at vCenter, slowing operations.

Workaround:
Reloading the APIC will clear tasks stuck in the queue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.768c)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu31457
Title:
Device wizard creates port as "0" for vnsLDevVip
Description:

Symptom:
cluster manage port can not be saved.

Conditions:
after fix, the cluster management port is aved.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(4k), 1.1(0.878), 1.1(0.882a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus63191
Title:
ISIM: Addtional config from isim leafs should be added automatically
Description:

Symptom:
There is no infra vlan connectivity to the leaf in the simulator from the ESX (host) added to AVS.

Ping to 10.0.0.30 (opflex discovery ip) does not work.

Conditions:
Add an ESX host to AVS with the simulator.

Workaround:
Add a static route to the DHCP IP of the ESX's vmk1 as follows on the leaf:

Steps:
(1) ssh root@esx
(2) esxcfg-vmknic -l
(Note the ip addr of vmk1)

(3) ssh as root into leaf1

(4) route add leaf2-1-1.4

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(2.111)
Known Fixed Releases:
1.0(3.15), 1.0(3d), 1.0(3f), 1.1(0.667), 1.1(1j), 1.2(0.1), 2.0(0.2)
Bug Id:
CSCuu73003
Title:
On downgrading some fvCEps are getting lost
Description:

Symptom:
Some end-points are not getting reported under EPG.

Conditions:
When leaves are downgraded in quick succession after APIC, this happens.

Workaround:
End-points will get reported successfully after they age out and learned again.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.945a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus26627
Title:
Scale: Slow policymgr causing remote user logins vis ssh to fail
Description:

Symptom:
On large scale setups, some login requests are taking more than 30 seconds.

Conditions:
This can happen when the system is busy deploying policies to the leaves.

Workaround:
None. Retry login

Further Problem Description:
When a remote user logs in, it results in policy push of a few objects to all the leafs and spines. The MIT from which the objects to be pushed are selected, is very very large due to the scale. We go over this huge tree for each destination where the config needs to be pushed. As this search is very expensive, the transaction takes more than 30s and this results in slow responsiveness.

The fix is to reuse the config across destinations.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(2m), 1.1(0.747a)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut45880
Title:
MARCH 2015 OpenSSL Vulnerabilities
Description:

Symptom:
This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288

This bug has been opened to address the potential impact on this product.

Conditions:
Exposure is not configuration dependent.

APIC Controller Version 1.0(1X), 1.0(2X),1.0(3X)

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 7.1/6.9

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.0(2m), 1.0(3f)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCus69032
Title:
External image download stuck on IFC due to leader change
Description:

If there is a Cluster leadership change due to fabric connectivity changes or other reason this could affect the download action. The leadership/re-election changes needs to be handled gracefully.

Symptom:
The image download gets stuck and does not complete.

Conditions:
Clustering changes (any link flaps or node flaps that could affect cluster or trigger a leadership change)

Workaround:
Manually retrigger the Firmware download, by deleting the old Firmware Download policy and creating a new firmware download policy of same name or by just creating a new firmware download policy of different name

Further Problem Description:
During the Image download if there is some fabric churn and APIC leader re-election happened, it will result in the download action(download,validate and create firmware objects) not resulting to completion. This needs to be handled without interruption gracefully(re-spawn on new leader).

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.622a)
Known Fixed Releases:
1.0(3.52), 1.1(0.662a), 1.1(0.667), 1.1(0.839a), 1.1(0.843a), 1.1(0.846), 1.1(1j), 1.2(0.1), 2.0(0.2)
Bug Id:
CSCut25587
Title:
ifav41: pconsResolver stuck at shard20 on leaf164
Description:

Symptom:
None of the contracts are downloaded to leaf.

Conditions:
This issue can happen only during stateless reload of a leaf, when leaf is registering for policies from APIC, and is more likely to happen in a scale configuration.
On leaf pconsResolver objects (there are 32, one per shard) should have triggerSt property set to completed. If triggerSt has a value different than complete, this issue has been hit.

Workaround:
Stateless reload leaf.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.718c)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut68368
Title:
Scale:Traffic not hitting the proper rule after del/re-add of contract
Description:

Symptom:
Traffic between application endpoint groups and external Layer 3 networks on different leafs is dropped if multiple external Layer 3 networks are configured in the same context.

Conditions:
This can happen when multiple L3Out are deployed in the same private network (fvCtx) in the following scenario:
Application EPG A deployed on leaf1, in contract with L3Out A on leaf 2
L3Out B deployed on leaf1. Due to implicit deny rules for this L3Out, this will drop traffic on the same context between the application EPG and the other L3Out.

Workaround:
If multiple L3Out are deployed for the same private network, then change the private network to policy unenforced.

This bug is on top of original issue fixed under bug id CSCut25657.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
13-JUL-2015
Known Affected Releases:
1.1(0.185)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCut68375
Title:
STP BLK and forward change when one of VPC peer is down
Description:

Symptom:
When using a Nexus 9508 and vPC peer-links created on different modules, the STP status of the vPCs change to BLK and then FWD when one of the modules is shut down.

- Nexus 9508

N9K-1 ======= N9K-2
| |
----vpc----------
N9372

VPC peer-link : 1/35,1/36,2/35,2/36 on both N9Ks

With the above topology, if the customer shutdown module 2 in N9508#1, N9508#2's Po212 STP status is changed BLK and then remained as BLK.
> > Po212 Desg BLK 1 128.4307 (vPC) P2p
To recover this, partner tried to do following thing on N9508#1.
> > - no spanning-tree vlan 16
> > - spanning-tree vlan 16

Additionally, after recovering this issue, partner tried to do shutdown the slot2 in N9508#1 several times..
then the #2 chassis port-channel STP status was changed BLK and then FWD by itself in short.

Conditions:
- Version : n9000-dk9.7.0.3.I1.1.bin
- Hardware : cisco Nexus9000 C9508

- Nexus 9508

N9K-1 ======= N9K-2
| |
----vpc----------
N9372

VPC peer-link : 1/35,1/36,2/35,2/36 on both N9Ks

Workaround:
None

Further Problem Description:
N/A

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
6.1(2)I3(2), 6.1(2)I3(4), 7.0(3)I1(1)
Known Fixed Releases:
6.1(2)I3(4.3), 6.1(2)I3(4a), 6.1(2)I3(5), 7.0(3)I1(1b)
Bug Id:
CSCut64977
Title:
N9K: odd number Vlans are missing in vtpVlanTable
Description:

Symptom:
vtpVlanTable does not instantiate odd numbered vlans during snmpwalk.
snmpget works fine for both odd and even vlans.

Conditions:
Permform snmpwalk on vtpVlanTable with odd numbered vlans (3,5,7,9 etc. configured).

Workaround:
Use snmpget to retrieve values for odd numbered vlans.

Further Problem Description:
The issue exists in NXOS software release 7.0(3)I1(1). The fix exists in 7.0(3)I2(1) and all the later releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
7.0(3)I1(1.168)
Known Fixed Releases:
7.0(3)I2(0.376), 7.0(3)I2(1), 8.3(0)CV(0.72)
Bug Id:
CSCuu42733
Title:
APIC with different image in existing cluster causes inconsistent state
Description:

Symptom:
The APIC appliance sees a crash in the DMEs while getting a replication transaction, or when a configuration is missing on the APIC that was introduced with different version.

Conditions:
This issue occurs in an existing cluster:

- If an appliance is decommissioned and brought back with a different version than other appliances, which are in majority
- If an appliance is introduced as a new appliance to extend a cluster but is running a different version than other appliances

Workaround:
Before introducing new appliances in the existing cluster, make sure it is running the same version as other appliances. If the appliance is already introduced with a different version, to fix this problem:

1. Decommission the appliance that is running a different version (decommission is done from the other appliance in the cluster)
2. Upgrade to the same version as the rest of the cluster (acidiag installer)
3. Reboot clean of the appliance after it has been upgraded (eraseconfig)
4. Commission appliance back in the cluster

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
14-JUL-2015
Known Affected Releases:
1.1(0.895a), 1.1(0.897a), 1.1(1.90a), 1.1(1j)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuu61826
Title:
svc_ifc_opflexelem_core core encuntered with 1.0.4.j build
Description:

Symptom:Opflex Element process restart on the ToR

Conditions:ESX host connect. Timing related. Cannot happen easily.

Workaround:No workaround necessary. opflex element process will restart automatically.

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
7.3(0)ZN(0.8)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCuv34249
Title:
contract filters do not get deleted all the times
Description:

Symptom:
There is traffic which should not be allowed between EPG's

Conditions:
Previously there was a filter to allow that traffic and that filter was removed from the contract

Workaround:
- Disassociating the contract that used to contain the filter and associate it again to the consumer and provider EPG resolves the issue.
- Touch clean and reboot the leaf also fixes the issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
1.1(1j)
Known Fixed Releases:
Bug Id:
CSCus71452
Title:
N9300 - ADJMGR and FIB Next Hop Interface Out Of Sync
Description:

Symptom:
Certain IP's are unreachable when sending traffic through a Nexus 9300

Conditions:
Following a loop in the network

Workaround:
Clear ip arp x.x.x.x force-delete

Further Problem Description:
This is due to a disconnect in the state between ADJMGR and the FIB:

N9K-1# sh ip arp detail

Flags: * - Adjacencies learnt on non-active FHRP router
+ - Adjacencies synced via CFSoE
# - Adjacencies Throttled for Glean

IP ARP Table for context default
Total number of entries: 2
Address Age MAC Address Interface Physical Interface
1.1.1.250 00:00:52 0000.0000.0001 Vlan1 port-channel3 <---------------- SW points to Po3

N9K-1# sh forwarding adjacency platform

slot 1
=======

IPv4 adjacency information

next_hop:1.1.1.250 rewrite_info:0000.0000.0001 interface:Vlan1 (Phy 0x16000001) <------ FIB points to Po2
HH:0x7 Refcount:2 Flags:0x800 Holder:0x1 pbr_cnt:0 wccp_cnt:0
BCM adj: unit-0:100011 unit-1:0 unit-2:0, cmn-index: 7, LIF:1 Upd 3
BCM NVE adj: unit-0:0 unit-1:0 unit-2:0, cmn-index: 7, LIF:1 Upd 3

N9K-1# sh int snmp-ifindex | i 0x16000001
Po2 369098753 (0x16000001) <------------------------------------------------- SNMP IFindex for Po2

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUL-2015
Known Affected Releases:
6.1(2)I2(1), 6.1(2)I2(2), 6.1(2)I2(2a), 6.1(2)I2(2b), 6.1(2)I2(3), 6.1(2)I3(1), 6.1(2)I3(2), 6.1(2)I3(3.50), 6.1(2)I3(3a)
Known Fixed Releases:
6.1(2)I3(3.56), 6.1(2)I3(4), 6.1(2)I3(4.4), 6.1(2)I3(5), 7.0(3)I1(1)
Bug Id:
CSCuv03171
Title:
APIC 1.1.1j : VMM crashes child (Rn) of class compIp is already attached
Description:

Symptom:
VMM process dumps core after upgrade to 1.1(1j)

In /var/log/dme/log/svc_ifc_vmmmgr.bin.log.stderr file we observe error message such as follows:
terminate called after throwing an instance of 'error::CoreException'
what(): child (Rn) of class compIp is already attached. dn[(Dn0)] Dn0=, Rn=ip-[fe80::aaaa:bbbb:cccc:dddd]

Conditions:
This problem occurs when duplicate IPv4/IPv6 addresses are reported by vCenter in the guest.net data of virtual machine (GuestInfo managed objects).

Such condition may occur, for instance, when virtual interfaces exist and IPv6 auto-configuration is enabled

Workaround:
Remove duplicate IP address configuration from the virtual machine.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
1.1(1j)
Known Fixed Releases:
1.2(0.1)
Bug Id:
CSCup81353
Title:
STP current timer rollover after 100 days and repeated TC's
Description:

Symptom:
On Nexus 9000 switch, if there is any Topology Change during the uptime of the switch and if the switch uptime exceeds 90-100 days then the STP timer rolls over (overruns) and STP Topology Change BPDUs are sent every hello interval (ie 2 sec)

Conditions:
Nexus 9000 Switch running for about 90 to 100 days and experienced a TCN during the uptime of the switch.

Active Supervisor Uptime can be found from "show system uptime":

N9K-RTP-ESC# show system uptime
System start time: Fri Oct 25 09:40:58 2013
System uptime: 236 days, 8 hours, 56 minutes, 59 seconds
Kernel uptime: 110 days, 23 hours, 7 minutes, 49 seconds
Active supervisor uptime: 110 days, 23 hours, 2 minutes, 23 seconds <<<<<<<<<<<

Workaround:
For dual-supervisor setups:

1. Reload the standby supervisor using cli "reload module x" where x is standby supervisor slot number.
2. Use the 'show module' command to confirm that the standby supervisor is up and in the ha-standby mode.
3. Use the system 'switchover command' to switch to the standby supervisor.

For single-supervisor setups:
1. Upgrade to a release with the fix for this issue.

In case of dual SUP or Single SUP Nexus 9000 chassis, workaround would be to install the SMU which can be downloaded on Cisco.com under NX-OS Software Maintenance Upgrades (SMU)-6.1(2)I2(2a). SMU is a non-disruptive install process.

Further Problem Description:
Issue is fixed in 6.1(2)I2(2b) and 6.1(2)I3(1) and later.

There is a similar defect opened on the Nexus 7000 switch. It is being tracked via CSCuo80937.

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUL-2015
Known Affected Releases:
6.1(2)I2(2.53), 6.1(2)I2(2.81)
Known Fixed Releases:
6.1(2)I2(2b), 6.1(2)I2(2c), 6.1(2)I3(1)
Bug Id:
CSCus63207
Title:
Nexus 9k Kernel Panic Due Watchdog Timeout During Interrupt Storm
Description:

Symptom:
A Nexus 9k switch may experience a kernel panic due to a high volume of interrupt events, possibly due to link flaps seen over an attached FEX module.

`show logging onboard module 1 stack-trace`


Dumping interrupt statistics
CPU0 CPU1 CPU2 CPU3 intrs/last_sec max_intrs/sec

60: 1 3851542938 0 0 122 12430 PCI-MSI-edge linux-kernel-bde

Conditions:
High amount of interrupts are being sent to one of the switch's CPUs. Possible trigger could be a high rate of interface flaps.

Workaround:
None known.

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
6.1(2)I2(3), 7.0(3)I1(2)
Known Fixed Releases:
Bug Id:
CSCut85550
Title:
deletion of BD subnet did not deleted route on leafs
Description:

Symptom:
The static route definitions are not deleted after removing a public subnet.

Checking "show ip route vrf all" | egrep "x.x.x.x" shows the subnet is present in the routing table of the leaves while a particular subnet has already been removed from the Bridge Domain.

Conditions:
This issue occurs only if the subnet is created as public.

Workaround:
none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
1.0(3l), 1.1(0.766o)
Known Fixed Releases:
Bug Id:
CSCus62828
Title:
bcm_usd service crashed during PoC sub-IF configuration
Description:

Symptom:
Module reload due to bcm_usd crash (hap-reset)

Service "bcm_usd" (PID xxxx) hasn't caught signal 6 (core will be saved).
%MODULE-2-MOD_DIAG_FAIL: Module x (Serial number: XXXXXXXXXXX) reported failure due to Service on linecard had a hap-reset in device DEV_SYSMGR

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
6.1(2)I3(3)
Known Fixed Releases:
6.1(2)I3(3.80), 6.1(2)I3(4)
Bug Id:
CSCut49345
Title:
default route 0.0.0.0/0 failed to be programed into bcm T2
Description:

Symptom:
default route 0.0.0.0/0 failed to be prograde into Broadcom T2 chipset after isis flapping, which lead to all the traffic to outside ACI was droped.

Conditions:
This issue may happen when isis adjacency flapping between leaf and spine, routing information will be updated to T2 chipset but in some cases, the default route 0.0.0.0/0 will be failed to write into T2.

Workaround:
Disable all the ports that connected to this leaf from spine on GUI, then enable it. After routing information updated, default route will be programed properly.

Further Problem Description:
You will see below message from mnt/ifc/log/show_tech_info/show-tech-tor-lc.gz

4107743 378787. 03/19/2015 12:31:49.954: pt inserted v4 prefix 0.0.0.0/0 @0xc32fb578
4107744 378788. 03/19/2015 12:31:49.954: Req to create vobj with 1 paths
4107745 378789. 03/19/2015 12:31:49.954: Created vobj at 0xa135c38
4107746 378790. 03/19/2015 12:31:49.954: Allocd vobj dbel at 0xa0658c4 with hash 2000366087
4107747 378791. 03/19/2015 12:31:49.954: inserted vobj dbel at 0xa0658c4, hash 2000366087
4107748 378792. 03/19/2015 12:31:49.954: ufibpd_insert_vobj():154: Adding vobj
4107749 378793. 03/19/2015 12:31:49.954: ufib_platform_insert_vobj():548:[ERROR] failed to install vobj in hardware
4107750 378794. 03/19/2015 12:31:49.954: ufib_v4_bulk_v1_route_update():1324:[ERROR] add route failed for %s, error %s
4107751 378795. 03/19/2015 12:31:49.954: ufib_v4_bulk_v1_route_update():1326:[ERROR] 0.0.0.0/0
4107752 378796. 03/19/2015 12:31:49.954: ufib_v4_bulk_v1_route_update():1327:[ERROR] E_VOBJ_HW_INSTALL
4107753 378797. 03/19/2015 12:31:49.954: ufib_ufdm_v4_route_update():513:[ERROR] bulk route update failed, error:%s
4107754 378798. 03/19/2015 12:31:49.954: ufib_ufdm_v4_route_update():514:[ERROR] E_VOBJ_HW_INSTALL

But all the route information seems to be good when you show ip route vrf all on that leaf.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUL-2015
Known Affected Releases:
11.0(2m)
Known Fixed Releases:
11.0(3k), 11.1(0.181)
Bug Id:
CSCuv33239
Title:
Loose-node not created after receiving conflicting LLDP mgmt IPs
Description:

Symptom:
Loose node is initially created, but quickly deleted on specific leaf node.

Conditions:
Following port-channel bringup, leaf node momentarily received conflicting LLDP mgmt IPs for links within a port-channel.

Workaround:
Shut / No shut of the affected port-channel.
Clear reload of switch

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
21-JUL-2015
Known Affected Releases:
11.1(1j)
Known Fixed Releases:
1.1(1.114a), 1.1(1.119), 1.1(1n)
Bug Id:
CSCur70425
Title:
CDP frames tagged with Vlan 1, default native vlan changed on trunk
Description:

Symptom:
When changing the native vlan on a trunk port the peer device does not see the CDP neighbor anymore when configured as L3 port.

The issue can also be seen when configured in port channel between two devices. Issue is also seen on Nexus 7000 switch in 6.2.x based release.

Conditions:
Native vlan changed on a trunk port connecting to a Layer 3 port. The issue can be seen when connecting a Nexus device to another non-Nexus IOS device.

Workaround:
none

Further Problem Description:
Issue is about CDP packets are getting tagged with vlan tag of 1.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.1(2)I3(1)
Known Fixed Releases:
7.0(3)I1(0.157), 7.0(3)I1(1)
Bug Id:
CSCuv11991
Title:
Cisco Nexus 9000 Series ACI Mode Switch Access Control Vulnerability
Description:

Summary

A vulnerability in the cluster management configuration of the Cisco Application Policy Infrastructure Controller (APIC) and the Cisco Nexus 9000
Series ACI Mode Switch could allow an authenticated, remote attacker to access the APIC as the root user.

The vulnerability is due to improper implementation of access controls in the APIC filesystem. An attacker could exploit this vulnerability by
accessing the cluster management configuration of the APIC. An exploit could allow the attacker to gain access to the APIC as the root user and
perform root-level commands.

Cisco has released software updates that address this vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 8.5/7.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C
CVE ID CVE-2015-4235 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUL-2015
Known Affected Releases:
11.0(1b), 11.0(1c), 11.0(1d), 11.0(2j), 11.0(2m), 11.0(3f), 11.0(3i), 11.0(3k), 11.0(3m), 11.0(4)
Known Fixed Releases:
11.0(4o), 11.1(1j)
Bug Id:
CSCuu72094
Title:
Cisco APIC Access Control Vulnerability
Description:

Summary

A vulnerability in the cluster management configuration of the Cisco Application Policy Infrastructure Controller (APIC) and the Cisco Nexus 9000
Series ACI Mode Switch could allow an authenticated, remote attacker to access the APIC as the root user.

The vulnerability is due to improper implementation of access controls in the APIC filesystem. An attacker could exploit this vulnerability by
accessing the cluster management configuration of the APIC. An exploit could allow the attacker to gain access to the APIC as the root user and
perform root-level commands.

Cisco has released software updates that address this vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 8.5/7.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C
CVE ID CVE-2015-4235 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUL-2015
Known Affected Releases:
1.0(1e), 1.0(1h), 1.0(1k), 1.0(1n), 1.0(2j), 1.0(2m), 1.0(2n), 1.0(3f), 1.0(3i), 1.0(3k)
Known Fixed Releases:
1.0(3o), 1.0(4o), 1.1(1j), 1.2(0.1)
Bug Id:
CSCuu81949
Title:
9372TX:Ports go down randomly, dont negotiate 1g on extended cable later
Description:

Symptom:
Intermittent failure of interfaces on the Nexus 9372TX switches running 6.1(2)I3(4a), with the interfaces sometimes remaining down and not recovering. Reload might or might not recover it.

We dont know the trigger as of now.

This is a typical interface config:

interface Ethernet1/42
switchport access vlan 28
spanning-tree port type edge
speed auto 100 1000

Some trigger breaks the port and it does not come up with an extended cable ((about 175 - 250 feet)) using patch panel in between. Same port comes up with directly stretched cable of about 15-100 feet with or without patch panel. When you shift the same cable with same host from broken port to new port, it works.

With extended cable in broken condition (with the fact that host works on 1gig):
+ 'speed auto 100' gets the port up in 100g
+ 'speed auto' does not get the port up
+ 'speed 100' gets it to work
+ 'speed 1000' doesn't
+ 'speed auto 100 1000' doesn't

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
6.1(2)I3(4a)
Known Fixed Releases:
6.1(2)I3(4b), 7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.435), 7.0(3)I2(1)
Bug Id:
CSCuv46644
Title:
Enhancement: Need per filter DSCP marking on ACI Fabric
Description:

Symptom:
Need ability to mark dscp value based in the traffic type (L4 port and protocol) on traffic.

Conditions:
N/A

Workaround:
N/A

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUL-2015
Known Affected Releases:
11.1(1j)
Known Fixed Releases:
Bug Id:
CSCuu82032
Title:
N9K: CoPP Some ACLs are not programmed
Description:

Symptom:
Some of the control packets are not getting classify in their respective class. This results in control packet drops due to default copp policy.

For eg:
vpc peer-keepalive will fail

Conditions:
This issue has been seen on 6.1(2)I3(4)
Some of the CoPP ACLs are not programmed in the hardware.

For eg:
`show policy-map interface control-plane`
Control Plane

Service-policy input: copp-system-p-policy-strict

class-map copp-system-p-class-critical (match-any)
match access-group name copp-system-p-acl-bgp
match access-group name copp-system-p-acl-rip
match access-group name copp-system-p-acl-vpc
--------SNIP-----------


show access-list will not list those access-list


show access-lists summary will show that total ACE configured is 0.

IPV4 ACL copp-system-p-acl-undesirable
Total ACEs Configured: 0
Configured on interfaces:
Active on interfaces:
IPV4 ACL copp-system-p-acl-vpc
Total ACEs Configured: 0
Configured on interfaces:
Active on interfaces:
IPV4 ACL copp-system-p-acl-vrrp
Total ACEs Configured: 0
Configured on interfaces:
Active on interfaces:
IPV4 ACL copp-system-p-acl-wccp
Total ACEs Configured: 0
Configured on interfaces:
Active on interfaces:

Workaround:
re-apply 'copp profile strict'

Note: There could be a momentary spike in CPU and packet drop to CPU which can cause control plane drops, as Control plane is unprotected. It is better to do this during a maintenance window. Appropriate warnings are are printed when you attempt this.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.1(2)I3(4)
Known Fixed Releases:
7.0(3)I2(0.490), 7.0(3)I2(0.494), 7.0(3)I2(1)
Bug Id:
CSCuu55855
Title:
ACI Leaf reload affecting Traffic - possible vPC convergence
Description:

Symptom:
When routing is disabled on the BD and unkown mac unicast is set to porxy, traffic loss is seen on Leaf reload/vPC flap.

Conditions:
BD has to be in unkown unicast proxy and routing disabled

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
7.3(0)ZN(0.9)
Known Fixed Releases:
11.0(4k), 11.1(0.236)
Bug Id:
CSCut77409
Title:
APRIL 2015 NTPd Vulnerabilities buildenv 1.30
Description:

Symptom:
This product includes a version of ntpd that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-1798 and CVE-2015-1799

This bug has been opened to address the potential impact on this product.

Conditions:
Using symmetric keys for the peers increases vulnerability.

Affected Versions
1.0(2m)
1.0(3k)

Expected Fixed Version
1.1(1)

Workaround:
Not available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 4.3/3.2

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
1.0(3m)
Known Fixed Releases:
Bug Id:
CSCuv37825
Title:
arp packets looped back through vpc leg of peer when TCN
Description:

Symptom:
ARP packets might get looped back through vpc leg of peer when mac address table churn, in turn causing mac move events in the L2 network.

Conditions:
TCN/clear mac address-table manually.

Workaround:
n/a

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUL-2015
Known Affected Releases:
6.1(2)I3(4b), 7.0(3)I1(2)
Known Fixed Releases:
Bug Id:
CSCus42784
Title:
JANUARY 2015 OpenSSL Vulnerabilities
Description:

Symptom:
This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206

This bug has been opened to address the potential impact on this product.

Conditions:
N9K is not vulnerable to the two DTLS issues:
- (CVE-2014-3571) DTLS segmentation fault in dtls1_get_record
- (CVE-2015-0206) DTLS memory leak in dtls1_buffer_record

N9k is vulnerable to fourCVEs:
- (CVE-2015-0205) is from an old protocol which is not used in most (we have to see if it is used by any if at all) of existing nxos application
- (CVE-2014-3570) is a bug with very low probability of occurring.
- (CVE-2014-3572) and (CVE-2015-0204).

N9K is not vulnerable to CVEs:
- (CVE-2014-3569) ssl23_get_client_hello function does not properly handle attempts to use unsupported protocols
- (CVE-2015-0205) DH client certificates accepted without verification [Server]

Workaround:
Avoid configurations that expose the vulnerabilities.

Exposure is possible with configurations using features nxapi, vmtracker, or onep; configuration using ldap or fabric database with enable-ssl options will also be exposed.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 5.0/3.7

http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
7.0(3)I1(1.1)
Known Fixed Releases:
7.0(3)I1(1.168), 7.0(3)I1(2), 7.0(3)I2(0.177), 7.0(3)I2(1), 7.0(3)IX1(1.93), 7.0(3)IX1(2), 8.3(0)CV(0.72)
Bug Id:
CSCuv35406
Title:
Nexus 9300 does not learn MAC addresses on FEX HIF ports
Description:

Symptom:
Nexus 9300 switches may not learn MAC addresses on FEX HIF ports

Conditions:
Nexus 9300 running 7.0(3)I1(2) with FEX attached.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
7.0(3)I1(2)
Known Fixed Releases:
7.0(3)I1(2.4), 7.0(3)I1(3), 7.0(3)I2(0.487), 7.0(3)I2(1)
Bug Id:
CSCuv48565
Title:
SSTE: Traffic drops post unshutting nve intf on the secondary vpc peer
Description:

Symptom:
Traffic drop

Conditions:
shut / unshut of nve interface on the perational secondary vpc peer.

Workaround:
NA

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
7.0(3)I2(0.486)
Known Fixed Releases:
Bug Id:
CSCuv24988
Title:
ACI contract missing for static path with ondemand policy via VPC in EPG
Description:

Symptom:
Server has a VPC link to a couple of leaf, only one of leaf has the configured contract deployed, but the rules is not found from the other leaf when the problem happen. The configuration would work from beginning. The rule used to be programmed in both leaf but was incorrectly deleted from one VPC leg.

From the policyelement log, svc_ifc_policyelement.log for example.
4079||15-07-08 20:54:55.583+00:00||fv||DBG4||co=doer:0:0:0xf0e19:9,dn=uni/epp/fv-[uni/tn-TestTenant/ap-TestAppPro/epg-TestEPG]||No end-points left; unprogramming rules||../dme/svc/policyelem/src/gen/ifc/beh/imp/./fv/AREpPBI.cc

But if we issue "show system internal epm vlan EPG-ENCAPVLAN", there are active EP there.

Conditions:
The server connects to a couple of leaf switches via VPC.
The static path over the VPC is configured under the EPG which could be associated with physical domain or VMM domain.
The policy immediacy of the static path is set as "on demand"

Workaround:
Workaround:
1. If they can avoid policy download set to lazy on the EPG, then we wont have this issue.
2. Clear task on that vlan should trigger the delete of all eps. Or
3. Delete add of EPG would also work as a workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
11.1(1j)
Known Fixed Releases:
11.1(1.268), 11.2(0.28)
Bug Id:
CSCus29812
Title:
binding entry got deleted for dhcp release through stp BLK port
Description:

Symptom:
when interface is in stp block state and dhcp snoop is configured on the vlans of this interface, then dhcp pkts coming from that vlan cannot be blocked by STP, it will still be sent to dhcp process.

Conditions:
interface is in STP block state and one or some vlans on that interface is configured with dhcp snoop

Workaround:

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
25-JUL-2015
Known Affected Releases:
7.0(3)I1(0.206)
Known Fixed Releases:
Bug Id:
CSCuu51335
Title:
9464PX Ports 14 & 16 doesnt work with GLC-T Transcievers
Description:

Symptom:
Link doesnt come up with Port 14 or Port 16 on 9464PX card with GLC-T Transceivers

Conditions:
9464PX card with GLC-T Transceivers on port 14 or port 16

Workaround:
Insert GLC-TC transceivers on port 13 and 15 and configure them to be same speed as that of what is desired for port 14 and port 16. Now, port 14/16 should start working.

Further Problem Description:
Disabling auto-neg through bcm-shell might bring up the link, but actual traffic doesnt go through. Not specific to 3.4 software version, even older software versions have the problem.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUL-2015
Known Affected Releases:
6.1(2)I3(4), 7.0(3)I1(1.251), 7.0(3)I2(0.333)
Known Fixed Releases:
6.1(2)I3(4b), 7.0(3)I1(2.4), 7.0(3)I1(3), 7.0(3)I2(0.346), 7.0(3)I2(1), 8.3(0)CV(0.72)
Bug Id:
CSCus64597
Title:
STP core on BPDU guard enabled port flaps and Hap reset
Description:

Symptom:
When a BPDU guard enabled port receives a BPDU the port is put to error disabled.
Under this condition a STP process core is seen and the box could reload due to hap reset,
if the condition is persistent

Conditions:

Workaround:
Disable BPDU guard

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.1(2)I3(3)
Known Fixed Releases:
6.1(2)I3(3a), 7.0(3)I1(0.269), 7.0(3)I1(1), 7.0(3)I2(0.101), 7.0(3)I2(0.97T), 7.0(3)I2(1)
Bug Id:
CSCuv05263
Title:
N9K Looping VTP Advertisement within vPC Domain
Description:

Symptom:
High CPU (netstack and VTP).

The VTP packet storm could hit adjacent devices causing instability downstream or upstream.

Conditions:
When VTP advertisement is received in Nexus 9000 fully transparent VTP vPC domain.

Workaround:
Disable VTP feature (no feature ftp)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
6.1(2)I3(4a)
Known Fixed Releases:
6.1(2)I3(4.7), 6.1(2)I3(5), 7.0(3)I1(2.3), 7.0(3)I1(3), 7.0(3)I2(0.452), 7.0(3)I2(1)
Bug Id:
CSCuv48602
Title:
SSTE: Routes not seen in the neighbors for 5 mins after Spine SSO
Description:

Symptom:
Traffic drop after SSO

Conditions:
SSO

Workaround:
NA

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUL-2015
Known Affected Releases:
7.0(3)I2(0.486)
Known Fixed Releases:
Bug Id:
CSCuu97734
Title:
Flapping "reverse port filter" creates a stale rule
Description:

Symptom:
Traffic is still allowed even though it is expected to be blocked

Conditions:
Flapping "reverse port filter" 3 or more times.

Workaround:
Non-disruptive workarounds:
1. Remove and re-apply the contract
2. Remove the filter association from the subject and re-apply

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
11.1(1j)
Known Fixed Releases:
1.1(1l), 1.2(0.1)
Bug Id:
CSCuv46792
Title:
N9K - Loops DHCP Packet on Spanning-tree Blocked Port
Description:

Symptom:
High cpu in dhcp_snoop and pktmgr
Excessive drops in the DHCP CoPP class
Control plane instability

Conditions:
N9K acting as DHCP Relay agent with a link in Spanning-tree Alternate Blocking State

Workaround:
Shut down the Alternate Blocking port or prune the vlan which the loop is occurring in from this interface

Further Problem Description:
This bug is tracking the looping of DHCP relayed packets on a Nexus 9000 on an interface that is in ALT BLK state for spanning-tree in the client VLAN.

Status:
Open
Severity:
1 Catastrophic
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(2)I3(2), 6.1(2)I3(4b), 7.0(3)I1(2)
Known Fixed Releases:
Bug Id:
CSCur49241
Title:
Buffer Boost ACL take Precidence over vPC redirect ACL
Description:

Symptom:
L3 switched packets that need to cross a vPC peer-link will be dropped with the buffer boost feature enabled under certain circumstances.

Also Port-channel consistency will fail.

sh consistency-checker membership port-channels
Checks: Trunk group and trunk membership table.
Consistency Check: FAILED

Conditions:
Local interface of vPC is down. So traffic after L3 switch need to cross vPC peer link to remote vPC "UP" on peer.

Only for 9564TX/9564PX/9536PQ and TOR -N9K-C93128TX N9K-C9396PX

Workaround:
Disble buffer boost on for vPC which do not have "UP/Active" link
Core-9508-1(config)# int port-channel 101
Core-9508-1(config-if)# no buffer-boost
Core-9508-1(config-if)# end

sh port-ch sum
101 Po101(SD) Eth LACP Eth2/1(D) Eth3/1(D)

Note: Making changes in config for buffer-boost will bounce the interface.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(2)I2(2b), 6.1(2)I3(1)
Known Fixed Releases:
6.1(2)I3(1.44), 6.1(2)I3(2), 6.1(2)I3(2.5), 6.1(2)I3(3)
Bug Id:
CSCus61617
Title:
Kernel panic - not syncing: Unexpected SERR
Description:

Symptom:
N9K Switch experienced a kernel panic crash saying "SERR"

Conditions:
This issue was first observed on 6.1(2)I3.

Workaround:
This is a parity error. Follow below corrective action:

first occurrence - monitor
2nd occurrence - RMA

Further Problem Description:
due to code error in reporting, the kernel panic reports "SERR" error. It should report as single bit or multi-bit error. This error in report is fixed in 6.1(2)I4 or newer releases.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(2)I3(2)
Known Fixed Releases:
6.1(2)I3(3.73), 6.1(2)I3(3.81), 6.1(2)I3(4), 7.0(3)I1(1.100), 7.0(3)I1(2)
Bug Id:
CSCuv06108
Title:
%IPFIB-SLOT1-4-UFIB_ROUTE_CREATE: Unicast route create failed for VRF
Description:

Symptom:
%IPFIB-SLOT1-4-UFIB_ROUTE_CREATE: Unicast route create failed for VRF message will be in syslog

Conditions:
As part of the above syslog following error should be seen:

Error: Internal error(-1)

Workaround:
To clear the condition reload of the specific slot reporting the error is necessary.
If it is a ToR, the ToR has to be reloaded.

Further Problem Description:
This is seen only on T2 instances operating in ALPM mode

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
6.1(2)I3(4), 6.1(2)I3(4b)
Known Fixed Releases:
6.1(2)I3(4.6), 6.1(2)I3(4b), 6.1(2)I3(5), 7.0(3)I1(2.5), 7.0(3)I1(3), 7.0(3)I2(0.456), 7.0(3)I2(0.487), 7.0(3)I2(1)
Bug Id:
CSCuv20065
Title:
EVPN External routing BGP EVPN OSPF redistribution fail on 7.0(3)I1(2)
Description:

Symptom:
BGP Evpn redistribute into OSPF failed after upgrading to 7.0(3)I1(2)

Conditions:
7.0(3)I1(2)

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUL-2015
Known Affected Releases:
7.0(3)I1(2z)
Known Fixed Releases:
Bug Id:
CSCur28092
Title:
Nexus 9000 : evaluation of SSLv3 POODLE vulnerability
Description:



Symptom:

This product includes a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

This bug has been opened to address the potential impact on this product.



Conditions:


Web based HTTPS interface is provided in Nexus 9000 only when "feature nxapi" is enabled.
This feature is disabled by default.
When this feature is not enabled, Nexus 9000 is not vulnerable.



Workaround:


Disable 'feature nxapi' by doing 'no feature nxapi' in global config mode, if the feature is enabled.


Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(2)I3(1)
Known Fixed Releases:
6.1(2)I3(1.25), 6.1(2)I3(2), 6.1(2)I3(2.5), 6.1(2)I3(3), 6.1(2)I3(3.87), 6.1(2)I3(4)
Bug Id:
CSCut15554
Title:
TOR interface get stuck DIAG_PORT_LB-2-REWRITE_ENGINE_LOOPBACK_TEST_FAI
Description:

Symptom:
%DIAG_PORT_LB-2-REWRITE_ENGINE_LOOPBACK_TEST_FAIL: Module:2 Test:RewriteEngine Loopback failed 10 consecutive times. Faulty module: Error:Loopback test failed. Packets lost on the SUP in the receive direction.
Switch will stop processing traffic.
Switch will declare him self as STP root even if it is not configured to be a root.

Conditions:
Certain 1Gig/10Gig interface stuck in Rx direction. Result of huge pause frames received from connected device.

Workaround:
Nexus9396X-1(config-if-range)# bcm module 1 "0:port xe TxPAUse=off RxPAUse=off"

Further Problem Description:
Even Diags are failing this is not a HW issue.

Status:
Other
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(2)I3(2)
Known Fixed Releases:
7.0(3)I1(1.125), 7.0(3)I1(2)
Bug Id:
CSCur02700
Title:
Nexus 9000 evaluation for CVE-2014-6271 and CVE-2014-7169
Description:



Symptom:

The Cisco Nexus 9000 includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.



Conditions:

A user must first successfully log in and authenticate via SSH to trigger this vulnerability.



Workaround:

Not available.



Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html


The following CVE's are fixed in 6.1(2)I3(1).

CVE-2014-6271
CVE-2014-7169

6.1(2)I3(2) release will have the fix for the above two CVEs, and the additionally reported CVEs of
CVE-2014-7186, CVE-2014-7187,CVE-2014-6277, CVE-2014-6278

Hot patch that includes fixes for all the above 6 x CVEs for existing releases are now available for download.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(2)I2(2b), 7.2(0.1)VB(0.1)
Known Fixed Releases:
6.1(2)I1(3a), 6.1(2)I3(1)
Bug Id:
CSCuu82359
Title:
Evaluation of n9k-standalone-sw for OpenSSL June 2015
Description:

Symptom:
This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176

This bug has been opened to address the potential impact on this product.

Conditions:
Affects Nexus 9300 and 9500 Series. Affected versions include 7.0(3)I1(2) and prior.

Fixed version will be 7.0(3)I2(1). Estimated CCO 6/31/2015.

Workaround:
Avoid configurations that expose the vulnerabilities.

Exposure is possible with configurations using features nxapi, vmtracker, or onep; configuration using ldap or fabric database with enable-ssl options will also be exposed.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.8/6.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUL-2015
Known Affected Releases:
6.1(2)I3(4a), 7.0(3)I1(2)
Known Fixed Releases:
7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I2(0.432), 7.0(3)I2(1)
Bug Id:
CSCup55648
Title:
ipfib crash seen during extended stress and scale condition
Description:

Symptom:
MTS build-up for SAP 199 may lead to IPFIB crash of multiple line cards.

Conditions:
A large amount of adjacency updates/change notifications generated by the adjacency manager can cause buildup of these adjacency change MTS messages.

Workaround:
None

Further Problem Description:
With this fix a flow-control mechanism for adjacency manger & FIB adjacency updates is introduced to ensure the MTS queues are not overwhelmed due to any pending messages. The following commands may be used to monitor this condition -

show system internal mts memory
show system internal mts buffers summary
show system internal mts lc sap 199 stats

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(2)I2(2a), 7.0(3)I1(1.187), 7.0(3)IDD1(1.73)
Known Fixed Releases:
6.1(2)I3(4.5), 6.1(2)I3(5), 7.0(3)DEV1(1), 7.0(3)DEV1(1.5), 7.0(3)I1(2.7), 7.0(3)I1(3), 7.0(3)I2(0.426), 7.0(3)I2(1)
Bug Id:
CSCuu95970
Title:
switch does not forward control plane packets out of broadcom asic
Description:

Symptom:
port will go into "suspended" and end server will not receive LLDP or LACP packets from the switch.

Conditions:
Server is a linux server running a bond with active active LACP. Could be any operating system but linux supports LACP.

Workaround:
reload the switch.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
11.0(4m)
Known Fixed Releases:
11.1(1.266)
Bug Id:
CSCuv47053
Title:
N9K crashed due to Fatal Module Error, generated bcm_usd core
Description:

Symptom:
Nexus 9000 may crash and generate a bcm_usd core. The reset-reason shows 'Reset Requested due to Fatal Module Error'.

----- reset reason for module 1 (from Supervisor in slot 1) ---

1) At 524536 usecs after Fri Jul 17 13:36:09 2015
Reason: Reset Requested due to Fatal Module Error
Service: System manager
Version: 6.1(2)I3(2)

NVRAM logs:
%KERN-2-SYSTEM_MSG: [11487991.904152] usd process 5947, uuid 779 (0x30b) failed to send heartbeat - kernel
%SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "bcm_usd" (PID 5947) hasn't caught signal 6 (core will be saved).
%SYSMGR-SLOT1-2-LAST_CORE_BASIC_TRACE: fsm_action_become_offline: PID 4755 with message Could not turn off console logging on vdc 1 error: mts req-response with syslogd in vdc 1 failed (0xFFFFFFFF) .
%SYSMGR-SLOT1-2-LAST_CORE_BASIC_TRACE: core_client_main: PID 16522 with message filename = 0x102_bcm_usd_log.5947.tar.gz .
%MODULE-2-MOD_DIAG_FAIL: Module 1 (Serial number: XXXXXXXXXXX) reported failure due to Service on linecard had a hap-reset in device DEV_SYSMGR (device error 0x30b)

Conditions:
Not known

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(2)I3(2)
Known Fixed Releases:
6.1(2)I3(4.8), 6.1(2)I3(5)
Bug Id:
CSCuq09078
Title:
Hsrp move active/standby from vpc domain to another leaves gmac
Description:

Symptom:
Two different symptoms have been seen:
1) Traffic destined to VIP is looped on a backup/ listening/ standby switch
2) VMAC is programmed in hardware as a gateway MAC on backup/ listening/ standby switch

Conditions:
Two vPC pairs are L2 adjacent to each other, each pair is enabled for FHRP in the same group.
Traffic destined to VIP is received on backup/ listening/ standby which has gateway MAC configured in hardware, at this point the traffic will loop in software. No operational impact.

Workaround:
Remove second HSRP pair and flap SVI.

Further Problem Description:
This design is not supported on the Nexus 9000 at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUL-2015
Known Affected Releases:
6.1(2)I2(2b), 6.1(2)I3(0.178), 7.0(3)I1(1), 7.0(3)I2(1)
Known Fixed Releases:
7.0(3)I1(2.5), 7.0(3)I1(3), 7.0(3)I2(0.350), 7.0(3)I2(1), 8.3(0)CV(0.72)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论