HP Cisco Catalyst Blade Switch 3020 Release Note page 21

Cisco gigabit ethernet switch module for hp bladesystem p-class release notes cisco ios release 12.2(44)se1 and later
Hide thumbs Also See for Cisco Catalyst Blade Switch 3020:
Table of Contents

Advertisement

Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE
These caveats were resolved in Cisco IOS Release 12.2(44)SE:
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
CSCsl34355
Two crafted Protocol Independent Multicast (PIM) packet vulnerabilities exist in Cisco IOS
software that may lead to a denial of service (DoS) condition. Cisco has released free software
updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are
available.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml.
CSCsl62609
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS
software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities
addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to
provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCsm41883
High CPU usage (greater than 90 percent) no longer occurs on the switch when you first connect a
new device.
CSCsm57520
A switch no longer unexpectedly reloads when you configure the switch ports as dynamic ports by
using the VLAN Membership Policy Server (VMPS).
CSCsq13348
The Cisco IOS Intrusion Prevention System (IPS) feature contains a vulnerability in the processing
of certain IPS signatures that use the SERVICE.DNS engine. This vulnerability may cause a router
to crash or hang, resulting in a denial of service condition.
Cisco has released free software updates that address this vulnerability. There is a workaround for
this vulnerability.
NOTE: This vulnerability is not related in any way to CVE-2008-1447 - Cache poisoning attacks.
Cisco Systems has published a Cisco Security Advisory for that vulnerability, which can be found
at http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml.
CSCeg67844
The switch no longer returns an incorrect value for the ciscoFlashPartitionFileCount MIB.
CSCsb85001
When traffic passes through a VMPS port and you enter the shut interface configuration command,
a dynamic VLAN is now assigned.
Resolved Caveats
21

Advertisement

Table of Contents
loading

Table of Contents