Cisco Cisco IOS Software Release 12.4(23) Notas de publicación
531
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
Resolved Caveats—Cisco IOS Release 12.4(8)
Miscellaneous
•
CSCeb05456
Symptoms: A Cisco platform may reset its RP when two simultaneous write memory commands
from two different vty connections are executed, and messages similar to the following may appear
in the crashinfo file:
from two different vty connections are executed, and messages similar to the following may appear
in the crashinfo file:
validblock_diagnose, code = 10
current memory block, bp = 0x48FCC7D8,
memory pool type is Processor
data check, ptr = 0x48FCC808
next memory block, bp = 0x491AC060,
memory pool type is Processor
data check, ptr = 0x491AC090
previous memory block, bp = 0x48FCBBE8,
memory pool type is Processor
data check, ptr = 0x48FCBC18
The symptom is intermittent and is related to the way NVRAM is accessed.
Conditions: This symptom is observed on a Catalyst 6000 series Supervisor Engine 720 that runs
Cisco IOS Release 12.2(18)SXD but is platform- and release-independent.
Cisco IOS Release 12.2(18)SXD but is platform- and release-independent.
Workaround: Set the boot configuration to non-NVRAM media such as a disk or bootflash by
entering the following commands:
entering the following commands:
boot config disk0:
filename
nvbypass
•
CSCec15400
Symptoms: A Versatile Interface Processor 4 (VIP4) with an E1 controller may reload unexpectedly
and display the following error message:
and display the following error message:
%ALIGN-1-FATAL: Illegal access to a low address addr=0x28, pc=0x604716A8,
ra=0x604711FC, sp=0x60D66628
Conditions: This symptom is observed on a Cisco 7500 series that runs Cisco IOS
Release 12.2(15)T2, Release 12.2(15)T5, or Release 12.3.
Release 12.2(15)T2, Release 12.2(15)T5, or Release 12.3.
Workaround: There is no workaround.
•
CSCee72997
Cisco IOS devices that are configured for Internet Key Exchange (IKE) protocol and certificate
based authentication are vulnerable to a resource exhaustion attack. Successful exploitation of this
vulnerability may result in the allocation of all available Phase 1 security associations (SA) and
prevent the establishment of new IPsec sessions. Cisco has released free software updates that
address this vulnerability. This advisory is posted at
based authentication are vulnerable to a resource exhaustion attack. Successful exploitation of this
vulnerability may result in the allocation of all available Phase 1 security associations (SA) and
prevent the establishment of new IPsec sessions. Cisco has released free software updates that
address this vulnerability. This advisory is posted at
•
CSCef29090
Symptoms: The throughput for TCPClear sessions on a Cisco AS5850 may not be as expected and
there may be a slow response time.
there may be a slow response time.
Conditions: This symptom is observed on a Cisco AS5850 with TCPclear sessions.
Workaround: There is no workaround.
•
CSCeg03019
Symptoms: CEF may not work over different tunnels.