Specifications

1120
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Resolved Caveats—Cisco IOS Release 12.0(28)S2
0x60BC47D0 0000000064 0000000013 0000000832 MLP bundle name
0x60BC47D0 0000000068 0000000008 0000000544 MLP bundle name
0x60BC47D0 0000000072 0000000001 0000000072 MLP bundle name
0x60BC47D0 0000000076 0000000001 0000000076 MLP bundle name
0x60BC47D0 0000000088 0000000018 0000001584 MLP bundle name
Conditions: This symptom is observed when two interfaces are configured in the same multilink
group or are bound to the same dialer profile.
Workaround: There is no workaround.
Resolved Caveats—Cisco IOS Release 12.0(28)S2
Cisco IOS Release 12.0(28)S2 is a rebuild of Cisco IOS Release 12.0(28)S. The caveats listed in this
section are resolved in Cisco IOS Release 12.0(28)S2 but may be open in previous Cisco IOS releases.
This section describes only severity 1, severity 2, and select severity 3 caveats.
Basic System Services
CSCed64664
Symptoms: A “%SYS-2-LINKED: Bad enqueue .....” error message may be seen in the syslog of an
LNS right after traffic is sent through a PPP multilink bundle that is established via an L2TP session
on the LNS. This message is also seen when multilink PPP fragments are switched or when multicast
packets are replicated.
Certain packet buffers (particle clones) are eventually depleted, and multilink fragmentation stops
working when all particle clones are exhausted. You can monitor the availability of particle clones
by entering the show buffers | begin Particle Clones: EXEC command; the command does not
produce any output if no more particle clones are available.
Conditions: This symptom is observed with all features that use particles. The symptom is not
specific to VPDN, GRE, or other features that use particles.
Workaround: There is no workaround.
Further Problem Description: Different symptoms may occur with different features.
CSCed65285
Certain release trains of Cisco Internetwork Operating System (IOS), when configured to use the
Cisco IOS Secure Shell (SSH) server in combination with Terminal Access Controller Access
Control System Plus (TACACS+) as a means to perform remote management tasks on Cisco IOS
devices, may contain two vulnerabilities that can potentially cause Cisco IOS devices to exhaust
resources and reload. Repeated exploitation of these vulnerabilities can result in a Denial of Service
(DoS) condition. Use of SSH with Remote Authentication Dial-In User Service (RADIUS) is not
affected by these vulnerabilities.
Cisco has made free software available to address these vulnerabilities for all affected customers.
There are workarounds available to mitigate the effects of the vulnerability (see the “Workarounds”
section of the full advisory for details.)
This advisory will be posted at
http://www.cisco.com/warp/public/707/cisco-sa-20050406-ssh.shtml.
CSCed67358
Symptoms: An IPv6 PIM neighbor may be down after changing the PIM configuration.