we're preparing upgrading all our routers to fix this bug or close this vulnerability.
We have some devices which run the 12.2(33)SXJ train. However, the "Known fixed version" states that the version 12.2(33)SXJ6 should fix this bug, but I can not find anthing about it in the release notes.
How can I make / be sure that this is really fixed? Is it a error in the release notes?
Solved! Go to Solution.
In general, the bug toolkit is the authoritive source, which pulls the data from the internal bug tracking system.
Also, the alert here
explicitly calls out 12.(33)SXJ6.
Which document are you looking at that seems to have the wrong or confusing information?
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html and search for the string "34485".
I even checked the PDF version from the master document
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/ol_14271.html but there I only find this bug being resolved under 12.2(33)SXI12.
... not sure if the fact that SXI < SXJ implies the bug being resolved in SXJ because it has been explicitely resolved in SXI12?
This must be an oversight. The release note documents are "human created" and there is a special process for PSIRT bugs. I'm guessing a quirk in the publishing cycle caused an oversight here.
I will submit a request for errata. Not sure if it will ever get corrected, but I will pass information about the problem to the PSIRT group and the documentation group.
As a mater of believability in the presence of conflicting information, you can generally place greater trust in PSIRT bulletins since they tend to have more verification and rechecking than other documents on the website.
Thanks for reporting it. Sometimes things fall through the cracks and we can only fix it when people take the time to tell us. We appreciate the diligence and dedication of our customers.