Datasheet

229
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
WS-X6324-100FX
WS-X6416-GE-MT
WS-X6024-10FL-MT
This problem is resolved in Release 12.1(13)E15. (CSCef23843)
Traffic loss might occur on fabric-enabled modules when there are frequent OIRs. This problem is
resolved in Release 12.1(13)E15. (CSCee44496, CSCee48403, CSCee78766)
OSPF area border routers (ABRs) might continue to generate summary link-state advertisements
(LSAs) for obsolete nonbackbone intra-area routes. This problem is resolved in
Release 12.1(13)E15. (CSCee36622)
Traffic through a port-channel interface that has a Cisco IOS ACL configured might be dropped or
switched in software after a reload or after switchover to a redundant supervisor engine or after you
enter shutdown and no shutdown interface commands on a member port. This problem is resolved
in Release 12.1(13)E15. (CSCee21772)
With a switch fabric module (SFM), some modules might stop egressing traffic. This problem is
resolved in Release 12.1(13)E15. (CSCee08015)
In releases where caveat CSCdz27200 is resolved, files copied to an Advanced Technology
Attachment (ATA) disk might be corrupt. This problem is resolved in Release 12.1(13)E15.
(CSCed44319)
Under heavy traffic conditions, online insertion and removal (OIR) of a switch fabric module or OIR
of a nonfabric-enabled module might cause OSMs to stop forwarding traffic. This problem is
resolved in Release 12.1(13)E15. (CSCec49269)
After you remove a Cisco IOS ACL from an interface, the packets continue to be passed or dropped
as they would with the Cisco IOS ACL still attached. This problem is resolved in
Release 12.1(13)E15. (CSCec43666)
With other fabric-enabled modules installed, a WS-X6816-GBIC module does not come online after
a hot insert or software reset. This problem is resolved in Release 12.1(13)E15. (CSCec27072)
OSPF might set the partial database flag without a partial shortest path first (SPF) ever happening
when a link-state advertisement (LSA) update received from a neighbor has a different mask than
that in previous LSA updates, which might prevent the LSA from being deleted from the OSPF
database. This problem is resolved in Release 12.1(13)E15. (CSCdz82284)
If SrBuildSnmpMessage fails and the Simple Network Management Protocol (SNMP) performs an
SNMP memcpy operation on the invalidated memory, memory corruption might cause a reload. This
problem is resolved in Release 12.1(13)E15. (CSCdt12634)
Resolved General Caveats in Release 12.1(13)E14
With certain configurations, a reload might occur when you enter the show cdp entry * protocol
command. This problem is resolved in Release 12.1(13)E14. (CSCed40563)
With fall-back bridging configured, ARP fails after a switchover to the redundant supervisor engine.
This problem is resolved in Release 12.1(13)E14. (CSCed61632)
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the