Datasheet

198
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
A FIB-related memory leak might occur. This problem is resolved in Release 12.1(20)E2.
(CSCec43573)
For BGP routes learned through a WAN interface, if the BGP neighbor goes down, the default route
adjacency does not change if the default route learned through BGP had a better metric than a static
route configured locally. This problem is resolved in Release 12.1(20)E2. (CSCec41005)
An IGMP packet flood might cause a reload. This problem is resolved in Release 12.1(20)E2.
(CSCec39132)
When Border Gateway Protocol (BGP) uses multihome interfaces to peer with the neighbors that
are part of the same peer group or the same update group and you enter the neighbor next-hop-self
router configuration command on routers of a peer group, the next-hop calculation is performed only
on the first member of the peer group, and the same next-hop value is replicated to the rest of the
peers instead of calculating the next hop based on the next-hop-self configuration. This problem is
resolved in Release 12.1(20)E2. (CSCec14415)
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities. Support for
the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later Cisco IOS
releases are affected if configured for various types of Voice/Multimedia Application support. The
vulnerabilities can be exploited repeatedly to produce a denial of service (DoS). There are
workarounds available that may mitigate the impact, but these techniques may not be appropriate
for use in all customer networks. This advisory is available at:
http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
This problem is resolved in Release 12.1(20)E2. (CSCdx40184, CSCdx76632, CSCea46342,
CSCeb78836, CSCec76776, CSCed28873, CSCin56408)
When fragmenting MPLS traffic, a reload might occur after display of a “SYS-2-GETBUF”
message. This problem is resolved in Release 12.1(20)E2. (CSCeb16876)
With a complex Spanning Tree topology (for example, a high number of blocked ports in the same
VLAN), if an inferior BPDU is received at approximately the same time that the message age timer
expires, STP might send out BPDUs with obsolete information (for example, the previous root ID)
for the duration of the maximum age timer, which can delay STP convergence. This problem is
resolved in Release 12.1(20)E2. (CSCea68988)
When an interface that is configured with multiple IP multicast helper maps for the same group
address and for different broadcast addresses is removed, it generates false memory-access errors.
If the interface is reconfigured and removed again, the router will crash. This problem is resolved in
Release 12.1(20)E2. (CSCec63186)
When protocol independent multicast (PIM) dense mode is enabled, an interface in the outgoing
interface list may indicate it is in forwarding mode, but the P flag may be set to the group (S,G) state,
which prevents the interface from forwarding packets. This problem is resolved in
Release 12.1(20)E2. (CSCec70428)
The ip pim register source command is not supported in Release 12.1E. This problem is resolved
in Release 12.1(20)E2. (CSCec70483)
Memory corruption causes the software to reload when an illegal write operation is performed by
the authentication, authorization, and accounting (AAA) process. This problem is resolved in
Release 12.1(20)E2. (CSCec85347)
The show controller serial command output is not complete. This problem is resolved in
Release 12.1(20)E2. (CSCin60835)