Release Notes

12
Release Notes for the Cisco 1700 Series Routers for Cisco IOS Release 12.2(8)YL
OL-2941-03
Caveats
Caveats
Caveats describe unexpected behavior or defects in Cisco IOS software releases. Severity 1 caveats are
the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious
of these three severity levels.
Caveats in Release 12.2 T are also in Release 12.2(8)YL1. For information on caveats in Cisco IOS
Release 12.2 T, refer to the Caveats for Cisco IOS Release 12.2 T document. For information on caveats
in Cisco IOS Release 12.2, refer to the Caveats for Cisco IOS Release 12.2 document. These documents
list severity 1 and 2 caveats, and are located on CCO and the Documentation CD.
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any
severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical
Assistance Center: Tool Index: Bug Toolkit. Another option is to go to
http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Resolved Caveats - Release 12.2(8)YL1
Cisco IOS Release 12.2(8)YL1 is a rebuild release for Cisco IOS Release 12.2(8)YL. This section
describes unexpected behavior that is fixed in Release 12.2(8)YL1.
Miscellaneous
CSCdz71127
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml
CSCea02355
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml