Datasheet
288
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
• If an output route-map in an EBGP neighbor has match ip next-hop or match ip route-source or
match ip community or match ip extcommunity commands, then BGP updates might be
incorrectly suppressed if the next-hop of the best path changes. This problem is resolved in
Release 12.1(8b)E14. (CSCdv36378)
• With a network topology that creates an assert, after the assert winner prunes it's outgoing interface
(which is correct), some neighbor routers might fail to override the prune with a join, which might
break dense mode auto RP groups.This problem is resolved in Release 12.1(8b)E14. (CSCdv23921)
• The SNMP agent might send out trap using an incorrect IP address. This problem is resolved in
Release 12.1(8b)E14. (CSCdv19638)
• On ingress interfaces, a (S,G) assert is not given priority over a (*,G) assert. This problem is
resolved in Release 12.1(8b)E14. (CSCdv07210)
• Layer 3 multicast switching in hardware does not support multicast traffic through interfaces
configured with secondary ip subnets. This problem is resolved in Release 12.1(8b)E14.
(CSCdu71914)
• The mls ip multicast stub command does not support secondary ip subnets. This problem is
resolved in Release 12.1(8b)E14. (CSCdu69367)
• The distribute-list list_number out protocol protocol_number command does not work. This
problem is resolved in Release 12.1(8b)E14. (CSCdu52717)
• The show ip route command displays the Ethernet out-of-band (EOBC) interface, which should be
hidden. This problem is resolved in Release 12.1(8b)E14. (CSCdw39211)
• The EOBC directly connected route (127.0.0.0/8) is entered into the routing protocol database and
redistributed only if you enter the redistribute connected command for the protocol. This problem
is resolved in Release 12.1(8a)E14. (CSCdt89766)
• The Open Shortest Path First (OSPF) designated router might generate router link states but not
network link states for a connected network. The OSPF neighbors might come up correctly on all
the routers in the network. This problem is resolved in Release 12.1(8b)E14. (CSCdu08686)
• PIM sparse mode for the Auto RP groups might not set the L flag for the RP discovery group. This
problem is resolved in Release 12.1(8b)E14. (CSCdr51872, CSCdw13674)
• On a WS-X6816-GBIC switching module, the forwarding state of a VLAN on a trunk port or access
port might be blocking when it should be forwarding. This problem is resolved in
Release 12.1(8b)E14. (CSCdt93443)
Resolved Caveats in Release 12.1(8b)E13
• Cisco devices that run IOS and contain support for the Secure Shell (SSH) server are vulnerable to
a Denial of Service (DoS) if the SSH server is enabled on the device. A malformed SSH packet
directed at the affected device can cause a reload of the device. No authentication is necessary for
the packet to be received by the affected device. The SSH server in Cisco IOS is disabled by default.
The malformed packets can be generated using the SSHredder test suite from Rapid7, Inc.
Workarounds are available. The Cisco PSIRT is not aware of any malicious exploitation of this
vulnerability.
This advisory is available at this URL:
http://www.cisco.com/warp/public/707/ssh-packet-suite-vuln.shtml
This problem is resolved in Release 12.1(8b)E13. (CSCdz60229)