Datasheet

136
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
With the Cisco IOS Firewall CBAC feature enabled, if a client opens a connection to a server, which
causes a firewall session to be created, and the connection is terminated on both the client and the
server, the firewall session may never time out. This problem occurs with applications that use fixed
source and destination ports. This problem is resolved in Release 12.1(26)E8. (CSCsc72722)
Port 2 or port 4 on a WS-X6816-GBIC switching module might go up and down when port 1 is
enabled, not connected, and set to autonegotiate. This problem occurs if a 1000BASE-T GBIC was
ever inserted since the last time the module was reloaded. This problem is resolved in
Release 12.1(26)E8. (CSCse12195)
With a tunnel configured to use an ATM interface, one end of the tunnel cannot ping the other end
until you bring either end of the tunnel interface down and up. This problem is resolved in
Release 12.1(26)E8. (CSCse40423)
A reload might occur when a routing event causes a Reverse Path Forwarding (RPF) interface to
become an interface configured as a multicast boundary. This problem is resolved in
Release 12.1(26)E8. (CSCse92050)
A very slow memory leak might occur in the medium buffers. This problem occurs on a system
configured with a distributed EtherChannel (DEC). When this problem occurs, MALLOCFAIL
messages are displayed in the switch processor log. This problem is resolved in Release 12.1(26)E8.
(CSCsf31542)
The WS-X6516A-GBIC and the WS-X6548-GE-TX switching modules might fail the
TestL3VlanMet, TestIngressSpan and TestEgressSpan diagnostic tests when they come online while
the system is in flow-through mode. This problem is resolved in Release 12.1(26)E8. (CSCsg13124)
When a PBR route map is currently using an ACL, and then you modify, configure, or reapply the
ACL, TCAM entries might be programmed incorrectly and cause a connectivity problem. This
problem occurs when the ACL is on a Supervisor Engine 2. This problem is resolved in
Release 12.1(26)E8. (CSCse30376)
Resolved General Caveats in Release 12.1(26)E7
The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS
software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service
condition.
This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the
Cisco IOS device will not trigger this vulnerability.
Cisco has made free software available to address this vulnerability for affected customers.
This issue is documented as Cisco bug ID CSCek37177.
There are workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070124-crafted-tcp.shtml
This problem is resolved in Release 12.1(26)E7 (CSCek37177)