Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(55)SE and Later

22
Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(55)SE and Later
OL-22860-04
Resolved Caveats
CSCts34688
The switch crashes due to the "HACL Acl Manager" memory fragmentation when a large access
control list (ACL) is modified.
CSCts54282
A memory leak occurs when a Switch Virtual Interface (SVI) is configured and an external
management port is disabled on the Advanced Management Module (AMM).
There is no workaround.
CSCts58073
A threshold violation error message is displayed when a X2-10GB-LR module is installed on the
switch (with or without a fiber cable). An example error message is:
SFF8472-5-THRESHOLD_VIOLATION: Te1/0/1: Voltage low alarm; Operating value: 0.00 V,
Threshold value: 2.96 V
There is no workaround.
CSCts75641
Routing Information Protocol (RIP) Version 2 packets egressing an 801.1Q tunnel interface are
triplicated.
There is no workaround.
CSCtt16051
Cisco IOS Software contains a vulnerability in the Smart Install feature that could allow an
unauthenticated, remote attacker to cause a reload of an affected device if the Smart Install feature
is enabled. The vulnerability is triggered when an affected device processes a malformed Smart
Install message on TCP port 4786.
Cisco has released free software updates that address this vulnerability. There are no workarounds
to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20120328-smartinstall
CSCtt37202
If a client switch is authorized using MAC Authentication Bypass (MAB), and then by using the
802.1x standard and dynamic VLAN assignment, the MAC address of the switch is not updated in
the MAC address table of slave switches.
The workaround is to not use both the 802.1x and dynamic VLAN assignment configurations for the
client switch.
CSCtu17483
The switch crashes when an IP phone that uses LLDP and authenticates itself using MAC
Authentication Bypass (MAB) or 802.1x is physically disconnected and reconnected to the switch
port.
The workaround is to remove the aaa authorization network default group SG-PBA global
configuration command.