Datasheet
178
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
• OSPF area border routers (ABRs) might continue to generate summary link-state advertisements
(LSAs) for obsolete nonbackbone intra-area routes. This problem is resolved in Release 12.1(22)E2.
(CSCee36622)
• Traffic through a port-channel interface that has a Cisco IOS ACL configured might be dropped or
switched in software after a reload or after switchover to a redundant supervisor engine or after you
enter shutdown and no shutdown interface commands on a member port. This problem is resolved
in Release 12.1(22)E2. (CSCee21772)
• A small (approximately 180 bytes) memory leak occurs when you delete a logical interface. This
problem is resolved in Release 12.1(22)E2. (CSCee05413)
• If you change the STP root bridge, a Layer 2 loop might exist very briefly. This problem is resolved
in Release 12.1(22)E2. (CSCed85411)
Resolved General Caveats in Release 12.1(22)E1
• OSM-1CHOC12/T1-SI T1 interfaces that have path coding violations (PCVs) might cause
erroneous Layer 1 errors to be displayed for other T1 interfaces. This problem is resolved in
Release 12.1(22)E1. (CSCed86486)
• Many memory allocation failure (MALLOCFAIL) messages might occur for a Cisco Discovery
Protocol (CDP) process:
%SYS-2-MALLOCFAIL: Memory allocation of -1732547824 bytes failed from x605111F0, pool
Processor, alignment 0
-Process= "CDP Protocol", ipl= 0, pid= 42
-Traceback= 602D5DF4 602D78A0 605111F8 60511078 6050EC88 6050E684 602D0E2C 602D0E18
This problem is resolved in Release 12.1(22)E1. (CSCdz32659)
• With certain configurations, a reload might occur when you enter the show cdp entry * protocol
command. This problem is resolved in Release 12.1(22)E1. (CSCed40563)
• A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, and it describes this
vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS
software is available at
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
This problem is resolved in Release 12.1(22)E1. (CSCed93836, CSCdz84583)
• After Cisco IOS ACLs have been updated dynamically or after responding dynamically to an IDS
signature, a reload might occur following attempts to access a low memory address. This problem
is resolved in Release 12.1(22)E1. (CSCed35253)