Cisco Cisco Gigabit Ethernet Switch Module (CGESM) for HP Notas de publicación

Descargar
Página de 30
 
23
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-006
Resolved Caveats
CSCsq13348
The Cisco IOS Intrusion Prevention System (IPS) feature contains a vulnerability in the processing 
of certain IPS signatures that use the SERVICE.DNS engine. This vulnerability may cause a router 
to crash or hang, resulting in a denial of service condition.
Cisco has released free software updates that address this vulnerability. There is a workaround for 
this vulnerability.
NOTE: This vulnerability is not related in any way to CVE-2008-1447 - Cache poisoning attacks. 
Cisco Systems has published a Cisco Security Advisory for that vulnerability, which can be found 
at
This advisory is posted at 
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE 
These caveats were resolved in Cisco IOS Release 12.2(44)SE:
CSCeg67844
The switch no longer returns an incorrect value for the ciscoFlashPartitionFileCount MIB. 
CSCsb85001
When traffic passes through a VMPS port and you enter the shut interface configuration command, 
a dynamic VLAN is now assigned.
CSCsc26726
Gigabit interfaces 0/23 and 0/24 now link up with another switch when the interface speed is set to 
an explicit value. In previous releases, these ports would only link up with another switch if the ports 
on that switch were set to autonegotiate. 
CSCsc30733
This error message no longer appears during authentication when a method list is used and one of 
the methods in the method list is removed:
AAA-3-BADMETHODERROR:Cannot process authentication method 218959117 
CSCsd01180
The switch no longer reloads when you use a Kron command scheduler routine to automatically 
copy configuration data using the Secure Copy Protocol (SCP). (Kron is a Cisco IOS utility for 
scheduling non-prompting CLI commands to execute at a later time.)
CSCsd78044
When IGMP snooping is enabled and an EtherChannel member interface fails, the switch no longer 
stops forwarding multicast traffic on the EtherChannel. In previous releases, this occurred when 
multicast routing was enabled and the EtherChannel interface was a member of a multicast group not 
directly connected (that is, the multicast group that did not have the C flag set in the show ip mroute 
privileged EXEC command output).