Cisco Cisco IOS Software Release 12.2(15)ZJ

Pagina di 26
 
13
Release Notes for the Cisco 1700 Series Routers for Cisco IOS Release 12.2(15)ZJ5
OL-4380-05
Caveats
New Software Features in Release 12.2(15)T
For information regarding the features supported in the Cisco IOS Release 12.2 T, refer to the 
Cross-Platform Release Notes and New Feature Documentation links at the following location on 
Cisco.com:
This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and 
click the following path:
Service & Support
:
 Technical Documents
:
 Cisco IOS Software
:
 Release 12.2
:
 Release Notes
:
 
Cross-Platform Release Notes (Cisco IOS Release 12.2T)
Caveats
Caveats describe unexpected behavior or defects in the Cisco IOS software releases. Severity 1 caveats 
are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the 
least serious of these three severity levels.
Caveats in Release 12.2 T are also in Release 12.2(15)ZJ3. For information on caveats in the 
Cisco IOS Release 12.2 T, refer to the 
 document. For information 
on caveats in the Cisco IOS Release 12.2, refer to the 
These documents list severity 1 and 2 caveats; the documents are located on Cisco.com and the 
Documentation CD.
Note
If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any 
severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & SupportTechnical 
Assistance Center
Tool Index: Bug Toolkit. Another option is to go to 
.
Resolved Caveats for Release 12.2(15)ZJ5
The following sections lists the open caveats for the Cisco IOS Release 12.2(15)ZJ5.
CSCdz30977
Modem pass-through: Option to eliminate glitch for low-speed modem.
Symptoms: The V.22B modem connections may not work reliably when modem pass-through is 
configured.
Workaround
None.
CSCed93836
Modifications needed to syn rst packet response.
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been 
discovered by an external researcher. The successful exploitation enables an adversary to reset any 
established TCP connection in a much shorter time than was previously discussed publicly. 
Depending on the application, the connection may get automatically re-established. In other cases, 
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending