Cisco Cisco 2106 Wireless LAN Controller

Página de 60
 
57
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.1.163.0
OL-31336-01
  Caveats
CSCsq44516—Multiple vulnerabilities exist in the Cisco Wireless LAN Controllers (WLCs), Cisco 
Catalyst 6500 Wireless Services Modules (WiSMs), and Cisco Catalyst 3750 Integrated Wireless 
LAN Controllers. This security advisory outlines details of the following vulnerabilities:
Denial of Service Vulnerabilities (total of three)
Privilege Escalation Vulnerability
These vulnerabilities are independent of each other. Cisco has released free software updates that 
address these vulnerabilities. There are no workarounds available for these vulnerabilities.
This advisory is posted at 
.
CSCsq49329—The show services mobility detail ip_addr CLI command generates an error on the 
2106 controller, even when you enter a valid IP address.
CSCsq49975—When you enable ARP debugs and generate a gratuitous ARP, the gratuitous ARP 
does not come up to the dtl ARP module, and no debugs appear on the console.
CSCsq50866—When you configure QoS data rates for a guest role using the controller CLI, you can 
set values greater than 60000.
CSCsq55117—The controller might reboot when multiple people are connected through Telnet at 
the same time.
CSCsq57697—WPA2 PMK cache updates are not being sent across the mobility group.
CSCsq63106—The Cisco WiSM shows a memory leak of 1.8 MB every 2.5 hours. When the 
controller reaches a low-memory condition, it becomes unreachable, and the console might not be 
responsive.
CSCsq81667—Large IP packets that have been fragmented into multiple fragments might fail to be 
reassembled by a 4400 series controller.
CSCsq83843—The necessary components for the GARP declaration need to be clarified in the 
following message: “Jun 13 07:58:18.717 gid.c:506 DOT1D-6-PORT_FIND_FAIL: Port number 1 
is not found for GARP Information Declaration (GID).”
CSCsq83855—The following message requires further clarification: “Process: Name:fp_main_task, 
Id:11d92ca8.”
CSCsq86975—The controller might reboot if you have global Cisco Discovery Protocol (CDP) and 
access point CDP disabled and then you click the Refresh button on the CDP Neighbors page.
CSCsq87457—A Cisco WiSM might lock up or reboot due to a software failure of the 
NPUChecktask task.
CSCsr03008—A 1252 access point delays packets to 7921 phones intermittently for up to 20 to 30 
seconds. As a result, you might experience no rings, one-way audio, or no audio on the 7921 phones.
CSCsr06596—After the controller has been up for days, it might reboot because of a software 
failure of the apfRogueTask task.
CSCsr16689—Wired hosts cannot manage the 2106 controller through the dynamic interface.
CSCsr17163—Under conditions of very high stress, the controller shows no joined access points 
and clients and no traffic to or from clients. The controller also generates a crash file and reboots 
automatically.
CSCsr36756—After a controller running software release 5.1.151.0 contains a rogue access point, 
the state changes from “Contained” to “Alert.”