02-05-2014 02:48 AM - edited 03-20-2019 08:11 PM
Hi folks,
we're preparing upgrading all our routers to fix this bug or close this vulnerability.
We have some devices which run the 12.2(33)SXJ train. However, the "Known fixed version" states that the version 12.2(33)SXJ6 should fix this bug, but I can not find anthing about it in the release notes.
How can I make / be sure that this is really fixed? Is it a error in the release notes?
Cheers
Alex
Solved! Go to Solution.
02-07-2014 08:07 AM
The release notes are now updated. Thank you for bringing this problem to our attention.
02-05-2014 08:51 AM
In general, the bug toolkit is the authoritive source, which pulls the data from the internal bug tracking system.
Also, the alert here
(http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf)
explicitly calls out 12.(33)SXJ6.
Which document are you looking at that seems to have the wrong or confusing information?
02-05-2014 03:07 PM
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html and search for the string "34485".
I even checked the PDF version from the master document
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/ol_14271.html but there I only find this bug being resolved under 12.2(33)SXI12.
Cheers Alex
02-05-2014 03:09 PM
... not sure if the fact that SXI < SXJ implies the bug being resolved in SXJ because it has been explicitely resolved in SXI12?
02-05-2014 03:19 PM
This must be an oversight. The release note documents are "human created" and there is a special process for PSIRT bugs. I'm guessing a quirk in the publishing cycle caused an oversight here.
I will submit a request for errata. Not sure if it will ever get corrected, but I will pass information about the problem to the PSIRT group and the documentation group.
As a mater of believability in the presence of conflicting information, you can generally place greater trust in PSIRT bulletins since they tend to have more verification and rechecking than other documents on the website.
02-05-2014 10:51 PM
Thank you very much for this clarification.
02-06-2014 09:34 AM
Thanks for reporting it. Sometimes things fall through the cracks and we can only fix it when people take the time to tell us. We appreciate the diligence and dedication of our customers.
02-07-2014 08:07 AM
The release notes are now updated. Thank you for bringing this problem to our attention.
02-08-2014 08:43 AM
ACK.
Great.
Thanks.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: