Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(55)SE and Later

21
Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(55)SE and Later
OL-22860-04
Resolved Caveats
CSCtj88307
When you enter the default interface, switchport, or no switchport interface configuration
command on the switch, this message appears:
EMAC phy access error, port 0, retrying......
There is no workaround.
CSCtj89743
CPU usage is high when a device connected to the switch is accessed using the https://IP_address
command on the router.
The workaround is to reload the device.
CSCtn10697
The switch crashes when DCHP snooping is enabled with value 125 and an offer packet is received.
There is no workaround.
CSCto72927
If a Tcl policy is copied to the router, the router fails when an event manager policy is configured.
There is no workaround.
CSCtq09233
If a CLI configuration text file is copied from a Windows system to the switch, a space is appended
to the end of the macro description command when the file is read from the flash of the switch. This
leads to errors resulting in high CPU utilization on the switch. Another possible issue is that the
macro is not removed when the link goes down or the connected device is removed from the switch.
The workaround is to copy the configuration file from a non-Windows system (like UNIX or Linux)
or convert the file to an appropriate UNIX format before copying.
CSCtr28857
A vulnerability in the Multicast Source Discovery Protocol (MSDP) implementation of Cisco IOS
Software and Cisco IOS XE Software could allow a remote, unauthenticated attacker to cause a
reload of an affected device. Repeated attempts to exploit this vulnerability could result in a
sustained denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate
this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
CSCtr91106
A vulnerability exists in the Cisco IOS Software that may allow a remote application or device to
exceed its authorization level when authentication, authorization, and accounting (AAA)
authorization is used. This vulnerability requires that the HTTP or HTTPS server is enabled on the
Cisco IOS device.
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai