Cisco Cisco IOS Software Release 12.0 S 릴리즈 노트

다운로드
페이지 386
1034
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Resolved Caveats—Cisco IOS Release 12.0(29)S
CSCea21328
Symptoms: After a Versatile Interface Processor (VIP) has reloaded, there does not seem to be a 
crashinfo file because the crashinfo file is not closed; therefore, it is not visible or accessible. If the 
same VIP reloads again, both the first and second crashinfo files are accessible.
Conditions: This symptom is observed on a Cisco 7500 series that is running Cisco IOS 
Release 12.2(6f). The symptom may also occur in other releases.
Workaround: There is no workaround. 
CSCec69536
Symptoms: When you reload a Cisco 7500 series router with a new Cisco IOS software image, the 
router may reload unexpectedly during the bootup process and generate an “Imprecise cache parity 
error” message.
Conditions: This symptom is observed on a Cisco 7500 series that is configured with a Route Switch 
Processor 8 (RSP8) and that runs Cisco IOS Release 12.0 S or Release 12.2(18)S when you reload 
the router with an image of Cisco IOS Release 12.3 T.
Workaround: Do not reload the router. Rather, power-cycle the router to properly load the image of 
Cisco IOS Release 12.3 T. 
CSCed33110
Symptoms: A VIP crash can lead to a memory exhaustion situation on the RSP in turn leading to an 
RSP crash.
Conditions: This will happen more frequently on routers with a high idb count.
Workaround: There is no workaround. 
CSCed65285
Certain release trains of Cisco Internetwork Operating System (IOS), when configured to use the 
Cisco IOS Secure Shell (SSH) server in combination with Terminal Access Controller Access 
Control System Plus (TACACS+) as a means to perform remote management tasks on Cisco IOS 
devices, may contain two vulnerabilities that can potentially cause Cisco IOS devices to exhaust 
resources and reload. Repeated exploitation of these vulnerabilities can result in a Denial of Service 
(DoS) condition. Use of SSH with Remote Authentication Dial-In User Service (RADIUS) is not 
affected by these vulnerabilities.
Cisco has made free software available to address these vulnerabilities for all affected customers. 
There are workarounds available to mitigate the effects of the vulnerability (see the “Workarounds” 
section of the full advisory for details.)
This advisory will be posted at 
CSCed75238
Symptoms: A serial interface on a Cisco 7500 series may stop transmitting traffic and may report 
the following VIP crashes:
%MDS-2-LC_FAILED_IPC_ACK: RP failed in getting Ack for IPC message of size 84 to LC 
in slot 2 with sequence 1007, error = timeout
%RSP-3-RESTART: interface Serial3/0/0:0, not transmitting
%VIP2-3-MSG: slotX VIP-3-SVIP_CYBUSERROR_INTERRUPT: A Cybus Error occurred.
%VIP2-1-MSG: slotX CYASIC Error Interrupt register 0x4000000
%VIP2-1-MSG: slotX     DMA Transmit Error
%VIP2-1-MSG: slotX CYASIC Other Interrupt register 0x100
%VIP2-1-MSG: slotX     QE HIGH Priority Interrupt
%VIP2-1-MSG: slotX     QE RX HIGH Priority Interrupt
%VIP2-1-MSG: slotX CYBUS Error Cmd/Addr 0xD00FF3A