Cisco Blog » The Platform

2015年9月1日星期二

Cisco Notification Alert -ME 3800X Series Switch-01-Sep-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Alert Type:
New Release
Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Release Version:
15.3.3S6
Release Date:
01-AUG-2015

Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Release Version:
15.3.3S5
Alert Type:
Software Advisory
File Name:
me380x-universalk9-tar.153-3.S5.tar
File Description:

UNIVERSAL TAR

Software Advisory Date:
07-AUG-2015
Alert Type:
Software Advisory
File Name:
me380x-universal-tar.153-3.S5.tar
File Description:

UNIVERSAL W/O CRYPTO TAR

Software Advisory Date:
07-AUG-2015

Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Alert Type:
New Release
Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Release Version:
15.5.3-SN
Release Date:
18-AUG-2015

Software Updates for ME 3800X Series Carrier Ethernet Switch Routers

Product Name:
ME 3800X-24FS-M Switch Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
  

Find additional information in Software Downloads index.

Known Bugs - ME 3800X Series Carrier Ethernet Switch Routers

Alert Type:
Updated *
Bug Id:
CSCtx28468
Title:
ME-3800x crashes with specific ARP packet
Status:
Fixed
Severity:
1 Catastrophic
Description: *

Symptoms:
Cisco ME 3800X Series Carrier Ethernet Switch Routers may experience a device reload when receiving a series of ARP packets. An unauthenticated
attacker could cause a denial of service condition while sending these packets. The attacker must be layer-2 adjacent to the affected device in
order to trigger this vulnerability.

Conditions:
The attacker must be layer-2 adjacent to the affected device in order to trigger this vulnerability.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0

CVE ID CVE-2012-1345 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
06-AUG-2015
Known Affected Releases:
15.1(2)EY1a
Known Fixed Releases:
15.1(2)EY2, 15.2(1.18)S0.8, 15.2(2)S, 15.2(2)SA, 15.2(2)SA1, 15.2(2)SA2, 15.2(2)SNI, 15.2(2.8)S, 15.2(4)S1c, 15.2(4)S2
Alert Type:
Updated *
Bug Id:
CSCua98902
Title:
Remote LFA FRR support for whales - fibidbnot getting initialized
Status:
Fixed
Severity:
2 Severe
Description:

Symptoms: fibidb is not getting intialized.

Conditions: This symptom is observed when LFA FRR is configured in Cisco ME
3800x and ME 3600x switches.

Workaround: There is no workaround.

Last Modified:
10-AUG-2015
Known Affected Releases:
15.2(2)S
Known Fixed Releases: *
15.0(5.0)SG1, 15.0(5.0.26)SG, 15.1(1)IC66.17, 15.1(1)ICA4.16, 15.1(1)ICB29.1, 15.1(1)ICB40.1, 15.1(1)SY0.1, 15.1(1)SY1, 15.1(1)SY1.32, 15.1(1)SY1.55
Alert Type:
Updated *
Bug Id:
CSCuq19149
Title:
mVPN - ME3800 acting as 'P' router is causing PIM adj to drop b/w PE's
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
mVPN setup, ME3800 acting as P router flushes S,G entry.
The S,G on an 'P' router maintains the pim adjacency for the hello packets exchanged on the default mdt. Although continuous pim hello's are seen on 'P' router sent from the PE routers, but still the mroute output displays the S,G entry being deleted and re-created, thereby causing PIM adjacency to go DOWN between the PE's.

AND/OR

If the mVPN setup comprises of an PRIMARY PE which is sending mcast traffic regularly and an BACKUP PE which is passive and only takes over when PRIMARY is DOWN, it was noticed that the BACKUP PE's S,G on 'P' router was getting flushed.

Conditions:
mVPN setup with ME3800 deployed as 'P' router.

Workaround:
none

Further Problem Description:

Last Modified:
05-AUG-2015
Known Affected Releases:
15.3(3)S2
Known Fixed Releases: *
15.2(1)IC273.149, 15.2(2)E2, 15.2(4.0)ST, 15.2(5.0)ST, 15.3(3)S3.13, 15.3(3)S4, 15.4(1)S2.14, 15.4(1)S3, 15.4(1)T2.1, 15.4(1)T3
Alert Type:
Updated *
Bug Id:
CSCuu34964
Title:
1588 Hybrid clk not moving to PA, flapping between UNKNOWN & FL
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Hybrid clock not moving to phase aligned, flapping between UNKNOWN & Freq Locked

Conditions:
When hybrid clock master and slave is configured

Workaround:
There is no work aorund

Further Problem Description:

Last Modified:
12-AUG-2015
Known Affected Releases:
15.5(1)S0.20
Known Fixed Releases: *
15.4(3)S3.10
Alert Type:
Updated *
Bug Id:
CSCuv00359
Title:
LAG data(ifType) is wrongly populating in IF-MIB for ME3800/3600.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In ifTable, ifType value is wrongly populating for lag in ME3800/3600 devices.
For LACP enabled interfaces, ifType data should be 'ieee8023adLag'. But currently populating the data 'propVirtual'.

Conditions:
NO CONDITION

Workaround:
NA

Further Problem Description:

Last Modified:
24-AUG-2015
Known Affected Releases:
15.4(3)S2.1
Known Fixed Releases: *
15.5(3)S0.2, 15.5(3)SN, 15.6(0.10)S
Alert Type:
New
Bug Id:
CSCuv04872
Title:
Traceback as adjmgr_l2_update_mcast_nh_internal while creating cfm mep
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Traceback observed

Conditions:
trace back seen during creation of cfm mep

Workaround:
na

Further Problem Description:
na

Last Modified:
20-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu55880
Title:
Timeout with DM on CFM down mep over BD/EVC BD/port channel
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
getting differential return value in ip sla history

Conditions:
1.configure ospf
2.use time source NTP
3.configue CFM mep down
4.start sla and check for ip sla history

Workaround:
na

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
15.5(3)S
Known Fixed Releases:
15.5(2.21)S0.12, 15.5(2.21)S0.8, 15.5(3)M0.1, 15.5(3)S, 15.5(3)S0a, 15.5(3)SN, 15.6(0.2)T, 15.6(0.5)S

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论