Cisco Cisco IOS Software Release 12.2(55)SE

Page de 42
 
18
Release Notes for the Cisco IE 3000 Switch, Cisco IOS Release 12.2(55)SE and Later
OL-23061-05
  Resolved Caveats
Caveats Resolved for Cisco IOS Release 12.2(55)SE7
CSCtg52885
The Hot Standby Router Protocol (HSRP) on dot1q sub-interfaces remains in INIT state after a 
physical link flap on the trunk port.
The workaround is to enter the shutdown and no shutdown command on the interface.
CSCtz96168
IPv6 packets travel randomly between two isolated ports that are in the same VLAN.
There is no workaround.
CSCub92642
If the switch is configured with Multicast Distributed Switching (MDS), memory leaks if the 
multicast-routing distributed command is toggled repeatedly.
There is no workaround.
CSCud17778
Memory leaks (due to SNMP traps) cause the switch to respond slowly to commands; eventually the 
switch fails. This is observed when more than one SNMP server host is configured, one of the host 
broadcasts SNMP traps, or the snmp-server enable traps snmp authentication coldstart 
warmstart
 command is configured.
The workaround is to disable the snmp-server enable traps snmp authentication coldstart 
warmstart
 command and reload the switch.
Caveats Resolved in Cisco IOS Release 12.2(55)SE6
CSCef01541
The switch processes data packets that are sent to the network address of an interface if the layer-2 
frame encapsulating that packet is specifically crafted to target layer-2 address of the interface or a 
broadcast layer-2 address.
The workaround is to use Cisco Express Forwarding (CEF).
CSCtk18810
High memory usage is seen with the 'Virtual Exec" process.
There is no workaround.
CSCto57723
Cisco IOS Software and Cisco IOS XE Software contain a vulnerability that could allow an 
unauthenticated, remote attacker to cause a denial of service (DoS) condition. An attacker could 
exploit this vulnerability by sending a crafted request to an affected device that has the DHCP 
version 6 (DHCPv6) server feature enabled, causing a reload.
Cisco has released free software updates that address this vulnerability. This advisory is available at 
the following link:
CSCtt31901
The sh udld neighbor command does not work.
The workaround is to enable the udld port aggressive command on the interface level once.