On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced.
Cisco is currently investigating its product line to determine which products may be affected and the extent of the impact of the vulnerability on its products. Additional Cisco products will be added as the investigation progresses.
-Cisco Videoscape Distribution Suite Transparent Caching
There are currently no network-based mitigations for this vulnerability or any mitigations that can be performed directly on affected systems.
This issue already is escalated to BU and PA and waiting for the reply.
Here is the latest update from PA.
PA has agreed with the VDS-TC management team that a fix for this vulnerability will be available in release 6.0 which is planned to be released on Q3/2015. In release 6.0, the product will run on CentOS platform (instead of openSUSE as today) and the glibc library in use will have a fix for the glibc GHOST issue.
I need to come up with a baseline syslog script for XR and XE platforms and integrate them both with CoPP but the documentation I search doesn't cover both topics or how to change the port. I see some commands for switches to change the port but the ASR 9...
Hello everyone,We''ve just upgraded an ASR 9001 from version 4.3.4 to 5.3.4, and after "install activate" and reload, "install verify packages" resulted in this:[...] Info: /install/asr9k-base-4.3.4: [ERROR] Detected anomalies.[...]Info: Verification Summ...
I am trying to do a simple shaper with a basic scheduler to prioritize EF traffic across a link. With the policy that I have tried, I get an error upon commit "!!% 'DNX_QOSEA' detected the 'warning' condition 'Invalid egress policy, Cannot have both queui...