Cisco Cisco IOS Software Releases 12.2 MC 發佈版本通知

下载
页码 26
 
16
Release Notes for Cisco MWR 1941-DC Mobile Wireless Edge Router for Cisco IOS Release 12.2(15)MC2e
OL-13984-13
Caveats in Cisco IOS Release 12.2(15)MC2a
Note
If you have an account with Cisco.com, you can use Bug Navigator II to find caveats of any severity for 
any release. To reach Bug Navigator II, Login to Cisco.com and click Software CenterCisco IOS 
Software
Cisco Bugtool Navigator II. Another option is to go directly to 
http://www.cisco.com/support/bugtools. 
Open Caveats
The caveats listed in this section are open in Cisco IOS Release 12.2(15)MC2a.
CSCdz37497
Description: When PPPMux and cUDP are configured, during periods of sustained multicast traffic 
at a rate of 100 pps or more causes a periodic “out-of-sequence” condition in the MWR 1941-DC 
IOS decompression.
Workaround: Reduce the rate of multicast traffic.
CSCea73056
Description: During a failover, the MWR 1941-DC router software opens T1/E1 relays on the active 
router without taking down the multilink interface first. Packets are sent to the disconnected 
interface for the next several second until the multilink interface is declared down. This condition 
causes the network management system to not receive SNMP traps generated during the failover.
Workaround: There is currently no workaround.
CSCea85262
Description: When shutting down a multilink interface, the virtual access (VA) interface associated 
with the multilink interface flaps.
Workaround: Shut down the subinterface associated with the multilink group.
Resolved Caveats
This section lists the caveats that are resolved in Release 12.2(15)MC2a.
CSCdz32659
Description: Memory allocation failure (MALLOCFAIL) messages no longer occur for Cisco 
Discovery Protocol (CDP) processes. 
CSCec16481
A Cisco device running Internetwork Operating System (IOS) and enabled for the Open Shortest 
Path First (OSPF) Protocol is vulnerable to a Denial of Service (DoS) attack from a malformed 
OSPF packet. The OSPF protocol is not enabled by default.
The vulnerability is only present in IOS release trains based on 12.0S, 12.2, and 12.3. Releases based 
on 12.0, 12.1 mainlines and all IOS images prior to 12.0 are not affected. Refer to the Security 
Advisory for a complete list of affected release trains.
Further details and the workarounds to mitigate the effects are explained in the Security Advisory 
which is available at the following URL:
.