To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 11decf33ea4b8fd1e6543d7d59f72796e4fdac82b02454bc96ccbe 6125-CMW520-R2112P08.zip Reboot Requirement: After updating the interconnect module firmware, a reboot is implemented to activate the new firmware. Such reboot does not imply a service disruption. Refer to the Release Notes for specific details. Installation: The HPE 6125-CMW520-R2112P08 Release Notes.pdf, included in the zip file, has detailed instructions on page #19 on how to upgrade/install the firmware. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. 26.
Symptom: The internal interface of an IRF member switch is up after the following operations are performed. Modify the member ID of the switch. Save the configuration and reboot the switch. Condition: This symptom might occur if the following operations are performed.
2009 Foreign Reciprocity Resource Guide. NOTE: The U.S. Department of State (DOS) Drivers License Matrix has been revised and is available for download. Since 1926 the international community has attempted to standardize driver licensing documents, practices and procedures throughout the world. Sep 5, 2012 - This saves time when filling out an application for a rewards program at your. Technology has taken driver's license parsing to new heights.
Modify the member ID of the switch. Save the configuration and reboot the switch. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.
24. Symptoms: CVE-2015-0209. Condition: A malformed EC private key file consumed via the d2iECPrivateKey function could cause a use after free condition. This could lead to a DoS attack or memory corruption for applications that receive EC private keys from untrusted sources.
Symptoms: CVE-2015-0287. Condition: Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. Applications that parse structures containing CHOICE or ANY DEFINED BY components may be affected. Symptoms:CVE-2015-0288. Condition: The function X509toX509REQ will crash with a NULL pointer dereference if the certificate key is invalid.
Symptoms: CVE-2015-0289. Condition: The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing.
Symptoms: CVE-2015-0292. Condition: A vulnerability existed in previous versions of OpenSSL related to the processing of base64 encoded data. 87. Symptom: The switch cannot automatically obtain the configuration file from the server.
Condition: This symptom might occur if the switch starts up without a configuration file and attempts to obtain the configuration file from the server. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Symptom: SSL 3.0 failback protection. Condition: POODLE (CVE-2014-3566) and other SSL v3 vulnerabilites. Symptom: CVE-2014-3567. Condition: OpenSSL SSL/TLS/DTLS memory leak.
Symptom: CVE-2014-3568. Condition: OpenSSL handshake vulnerabilities.
DHCPv6 client did not get IPv6 address prefix length from RA. (16 Jan 2015). Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. A flaw in OBJobj2txt may cause pretty printing functions such as X509nameoneline, X509nameprintex et al. To leak some information from the stack.
Applications may be affected if they echo pretty printing output to the attacker. Error handling in the SSH protocol in several SSH servers/clients, including OpenSSH 4.7p1 and possibly other versions, when using Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data. (25 Sep 2014). Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Fix for: DHCP option 82 Reboot Symptom: The master board experiences unexpected reboot or hung because of fatal error. Condition: When system receives DHCP packet which contains abnormal option 82 field. Fix for: DAC cable compatibility Symptom: The SFP+ ports on HP 6125G/XG were not able to establish a link through some HP DAC(Direct Attach Copper) cables.
Condition: This issue existed with certain HP DAC cables. (25 Jan 2013).
To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 11decf33ea4b8fd1e6543d7d59f72796e4fdac82b02454bc96ccbe 6125-CMW520-R2112P08.zip Reboot Requirement: After updating the interconnect module firmware, a reboot is implemented to activate the new firmware. Such reboot does not imply a service disruption. Refer to the Release Notes for specific details.
Installation: The HPE 6125-CMW520-R2112P08 Release Notes.pdf, included in the zip file, has detailed instructions on page #19 on how to upgrade/install the firmware. Release Notes.
Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. 26. Symptom: The internal interface of an IRF member switch is up after the following operations are performed.
Modify the member ID of the switch. Save the configuration and reboot the switch.
Condition: This symptom might occur if the following operations are performed. Modify the member ID of the switch. Save the configuration and reboot the switch. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.
24. Symptoms: CVE-2015-0209. Condition: A malformed EC private key file consumed via the d2iECPrivateKey function could cause a use after free condition. This could lead to a DoS attack or memory corruption for applications that receive EC private keys from untrusted sources. Symptoms: CVE-2015-0287.
Condition: Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. Applications that parse structures containing CHOICE or ANY DEFINED BY components may be affected. Symptoms:CVE-2015-0288. Condition: The function X509toX509REQ will crash with a NULL pointer dereference if the certificate key is invalid. Symptoms: CVE-2015-0289. Condition: The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing. Symptoms: CVE-2015-0292. Condition: A vulnerability existed in previous versions of OpenSSL related to the processing of base64 encoded data.
87. Symptom: The switch cannot automatically obtain the configuration file from the server.
Condition: This symptom might occur if the switch starts up without a configuration file and attempts to obtain the configuration file from the server. Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Symptom: SSL 3.0 failback protection. Condition: POODLE (CVE-2014-3566) and other SSL v3 vulnerabilites. Symptom: CVE-2014-3567. Condition: OpenSSL SSL/TLS/DTLS memory leak.
Symptom: CVE-2014-3568. Condition: OpenSSL handshake vulnerabilities. DHCPv6 client did not get IPv6 address prefix length from RA. Version:6125-CMW520-R2111 (16 Jan 2015). Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. A flaw in OBJobj2txt may cause pretty printing functions such as X509nameoneline, X509nameprintex et al. To leak some information from the stack.
Applications may be affected if they echo pretty printing output to the attacker. Error handling in the SSH protocol in several SSH servers/clients, including OpenSSH 4.7p1 and possibly other versions, when using Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data. Version:6125-CMW520-R2110P01 (25 Sep 2014). Upgrade Requirement: Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version. Fix for: DHCP option 82 Reboot Symptom: The master board experiences unexpected reboot or hung because of fatal error.
Condition: When system receives DHCP packet which contains abnormal option 82 field. Fix for: DAC cable compatibility Symptom: The SFP+ ports on HP 6125G/XG were not able to establish a link through some HP DAC(Direct Attach Copper) cables.
Condition: This issue existed with certain HP DAC cables. Version:6125-CMW520-R2105 (25 Jan 2013).