Cisco Cisco IOS Software Release 12.4(23) Notas de publicación

Descargar
Página de 610
777
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
  Resolved Caveats—Cisco IOS Release 12.4(3h)
Resolved Caveats—Cisco IOS Release 12.4(3h)
Cisco IOS Release 12.4(3h) is a rebuild release for Cisco IOS Release 12.4(3). The caveats in this 
section are resolved in Cisco IOS Release 12.4(3h) but may be open in previous Cisco IOS releases. 
Basic System Services
CSCeg62070
Symptoms: Tracebacks or crash are seen during HTTP transactions with long URLs.
Conditions: The crash is seen when the length of any token in the URL of the request is excessively 
long.
Workaround: Disable HTTP server using the no ip http server command. 
CSCsj44081
Cisco IOS Software has been enhanced with the introduction of additional software checks to signal 
improper use of internal data structures. This enhancement was introduced in select Cisco IOS 
software releases published after April 5, 2007.
Details: With the new enhancement in place, Cisco IOS software will emit a 
“%DATACORRUPTION-1-DATAINCONSISTENCY” error message when it detects an 
inconsistency in its internal data structures. This is a new error message. The following is an 
example.
The %DATACORRUPTION-1-DATAINCONSISTENCY error message is preceded by a timestamp
May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error
The error message is then followed by a traceback.
It is important to note that this error message does not imply that packet data is being corrupted. It 
does, however, provide an early indicator of other conditions that can eventually lead to poor system 
performance or an IOS restart.
Recommended Action: Collect show tech-support command output and open a service request with 
the Technical Assistance Center (TAC) or designated support organization. Pay particular attention 
to any other error messages or error symptoms that accompany the 
“%DATACORRUPTION-1-DATAINCONSISTENCY” message and note those to your support 
contact. 
IBM Connectivity
CSCsf28840
A vulnerability exists in the Data-link Switching (DLSw) feature in Cisco IOS where an invalid 
value in a DLSw message could result in a reload of the DLSw device. Successful exploitation of 
this vulnerability requires that an attacker be able to establish a DLSw connection to the device.
There are workarounds available for this vulnerability.
This advisory is posted at