Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(37)SE and later

17
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(37)SE and Later
383623-009
Resolved Caveats
Open HP Caveats
These are the HP severity 2 open caveats for this release:
rQm 263546
Disconnecting the cable from the console port does not end a Telnet session. If you are in privileged
EXEC mode when you remove the cable, the next session that is started on the console port will also
be in privileged EXEC mode.
The workaround is to end the session before you remove the cable.
rQm 266129
If you power on a switch that does not have a config.txt file (the factory default file) and leave the
switch on for few hours, the switch console appears to be stalled during setup.
The workaround is to reload the switch before you continue to configure it.
Open Device Manager Caveats
This is the severity 3 device manager caveat for this release:
CSCef94061
If you enter the letter i by itself in the port description, the VLAN status column displays i; this only
occurs when you are using Device Manager through Netscape 7.1.
The workaround is to run Device Manager through Internet Explorer if you must enter a port
description with only the value “i.”
Resolved Caveats
These sections describe the caveats that have been resolved in these releases:
Caveats Resolved in Cisco IOS Release 12.2(37)SE1, page 17
Caveats Resolved in Cisco IOS Release 12.2(37)SE, page 18
Caveats Resolved in Cisco IOS Release 12.2(37)SE1
These caveats are resolved in Cisco IOS Release 12.2.(37)SE1:
CSCsc19259
The server side of the Secure Copy (SCP) implementation in Cisco IOS contains a vulnerability that
allows any valid user, regardless of privilege level, to transfer files to and from an IOS device that
is configured to be a Secure Copy server. This vulnerability could allow valid users to retrieve or
write to any file on the device’s filesystem, including the device’s saved configuration. This
configuration file may include passwords or other sensitive information.
The Cisco IOS Secure Copy Server is an optional service that is disabled by default. Devices that
are not specifically configured to enable the Cisco IOS Secure Copy Server service are not affected
by this vulnerability.
This vulnerability does not apply to the Cisco IOS Secure Copy Client feature.