Cisco Cisco IOS Software Release 12.4(2)XB6 發佈版本通知
8
Release Notes for the Cisco Broadband Wireless Gateway 2.3 for Cisco IOS Release 12.4(24)YG3
OL-21495-03
Caveats
•
CSCtg99042
The inter-BS handoff with WiMAX failed when BWG Release 2.x used inter-BS handoff where both
the Serving Base Station (SBS) and Target Base Station (TBS) shared the same IP address. The SBS
and TBS may share the same IP address when the SBS and TBS are different sectors of the same
base station. The debug wimax agw command output showed that the Path Registration Request
from the TBS is ignored.
the Serving Base Station (SBS) and Target Base Station (TBS) shared the same IP address. The SBS
and TBS may share the same IP address when the SBS and TBS are different sectors of the same
base station. The debug wimax agw command output showed that the Path Registration Request
from the TBS is ignored.
Intersector controlled handoff was introduced in BWG 2.3.
•
CSCtg48937
BWG 2.2 sent duplicated WiMAX-BS-Id(46) in accounting stop messages.
•
CSCtg53328
BWG 2.2 sent account terminate cause=0 (zero) when the communication to the base station was
lost.
lost.
•
CSCtg70521
In flow-accounting, framed-IP was not included in the accounting start (acct-start) record.
From BWG 2.3, the process of sending the accounting start message can be delayed by 3600
seconds.
seconds.
•
CSCtg96617
BWG 2.2 sent garbage values in the Acct-Multi-Session-id field of the accounting requests. The
RADIUS server discarded these packets.
RADIUS server discarded these packets.
•
CSCtg27890
BWG 2.0 and above failed when a DHCP start request (DISCOVER/REQUEST) was received in
downstream direction.
downstream direction.
•
CSCtc73759
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version
of Cisco IOS Software.
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version
of Cisco IOS Software.
Cisco has released free software updates that address these vulnerabilities. There are no
workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.
workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.
This advisory is posted at
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes
six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software,
and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory.
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that
have been published on September 22, 2010, or earlier:
six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software,
and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory.
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that
have been published on September 22, 2010, or earlier:
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security
Advisory Bundled Publication” at the following link:
Advisory Bundled Publication” at the following link:
•
CSCtd33567
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version
of Cisco IOS Software.
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version
of Cisco IOS Software.