v9.1.1c Releasenotes Digest v2.0
v9.1.1c Releasenotes Digest v2.0
1c
Fabric OS v9.1.1c Release Notes Digest
Version 2.0
Broadcom FOS-911c-RN
August 1, 2023
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
For more information, go to www.broadcom.com. All trademarks, trade names, service marks, and logos referenced herein
belong to their respective companies.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product or
circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
The product described by this document may contain open source software covered by the GNU General Public License
or other open source license agreements. To find out which open source software is included in Brocade products or to
view the licensing terms applicable to the open source software, please download the open source attribution disclosure
document in the Broadcom Support Portal. If you do not have a support account or are unable to log in, please contact
your support provider for this information.
Use of all versions of Brocade’s Fabric OS is subject to the terms and conditions of the Brocade Fabric Operating System
and Feature Licenses and License Keys End User License Agreement, effective October 1, 2019, as amended by
Brocade from time to time. It is the user’s responsibility to understand and comply with the terms of the EULA. By
downloading, installing, using, posting, distributing or otherwise making available FOS, you agree to be bound on an
ongoing basis by the EULA as updated by Brocade from time to time.
Broadcom FOS-911c-RN
2
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Table of Contents
Revision History................................................................................................................................ 53
Broadcom FOS-911c-RN
4
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Chapter 1: Preface
If you purchased Brocade product support from a Broadcom OEM/solution provider, contact your OEM/solution provider
for all your product support needs.
• OEM/solution providers are trained and certified by Broadcom to support Brocade products.
• Broadcom provides backline support for issues that cannot be resolved by the OEM/solution provider.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade
expertise. For more information on this option, contact Broadcom or your OEM.
For questions regarding service levels and response times, contact your OEM/solution provider.
To expedite your call, have the following information immediately available:
General Information:
Technical support contract number, if applicable.
Switch model.
Switch operating system version.
Error numbers and messages received.
supportSave command output and associated files.
For dual-CP platforms the supportSave command gathers information from both CPs and any AP blades installed in
the chassis.
Detailed description of the problem, including the switch or fabric behavior immediately following the problem and any
specific questions.
Description of any troubleshooting steps already performed and the results.
Serial console and telnet session logs.
Syslog message logs.
Broadcom FOS-911c-RN
5
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
FT00X0054E9
White papers, data sheets are available at www.broadcom.com. Product documentation for all supported releases is
available on the support portal to registered users. Registered users can also find release notes on the support portal.
Broadcom FOS-911c-RN
6
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
The following sections outline how to locate and download Brocade product manuals and release notes from Broadcom
and the support portal. Although the illustrations show Fibre Channel and Fabric OS (FOS), they work for all Brocade
products and operating systems.
2.1.2 Locating Product Manuals and Release Notes on the Support Portal
Complete the following steps to locate your product manuals on the support portal.
1. Go to https://support.broadcom.com/, click Login, and enter your username and password.
If you do not have an account, click Register to set up your account.
2. Select Brocade Storage Networking in the support portal.
Broadcom FOS-911c-RN
7
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Broadcom FOS-911c-RN
8
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Chapter 3: Overview
Broadcom FOS-911c-RN
9
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
4.1 Hardware
There is no new hardware supported with FOS v9.1.1c
4.2 Software
The following lists the software changes with this release.
For a full list of closed defects in this release see the Defects.
Broadcom FOS-911c-RN
10
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
5.1 Hardware
There is no new hardware supported with FOS v9.1.1b
5.2 Software
The following lists the software changes with this release.
5.2.2 Enhancements
FOS v9.1.1b includes the following enhancements, described in more detail below:
The command grep is enhanced to allow all options to filter and sort FOS command output.
5.2.2.1 Allow all options to filter and sort FOS command output with grep
The command grep is enhanced to allow all options to filter and sort FOS command output. Command options -r/R
designed for filesystem access are not allowed.
Full list of allowed options for grep is displayed below.
Pattern selection and interpretation:
-E, --extended-regexp PATTERNS are extended regular expressions
-F, --fixed-strings PATTERNS are strings
-G, --basic-regexp PATTERNS are basic regular expressions
-e, --regexp=PATTERNS use PATTERNS for matching
-f, --file=FILE take PATTERNS from FILE
-i, --ignore-case ignore case distinctions in patterns and data
--no-ignore-case do not ignore case distinctions (default)
-w, --word-regexp match only whole words
-x, --line-regexp match only whole lines
-z, --null-data a data line ends in 0 byte, not newline
Broadcom FOS-911c-RN
11
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Miscellaneous:
-s, --no-messages suppress error messages
-v, --invert-match select non-matching lines
-V, --version display version information and exit
--help display this help text and exit
Output control:
-m, --max-count=NUM stop after NUM selected lines
-b, --byte-offset print the byte offset with output lines
-n, --line-number print line number with output lines
--line-buffered flush output on every line
-H, --with-filename print file name with output lines
-h, --no-filename suppress the file name prefix on output
--label=LABEL use LABEL as the standard input file name prefix
-o, --only-matching show only nonempty parts of lines that match
-q, --quiet, --silent suppress all normal output
--binary-files=TYPE assume that binary files are TYPE;
TYPE is 'binary', 'text', or 'without-match'
-a, --text equivalent to --binary-files=text
-I equivalent to --binary-files=without-match
-d, --directories=ACTION how to handle directories;
ACTION is 'read' or 'skip'
-D, --devices=ACTION how to handle devices, FIFOs and sockets;
ACTION is 'read' or 'skip'
-L, --files-without-match print only names of FILEs with no selected lines
-l, --files-with-matches print only names of FILEs with selected lines
-c, --count print only a count of selected lines per FILE
-T, --initial-tab make tabs line up (if needed)
-Z, --null print 0 byte after FILE name
Context control:
-B, --before-context=NUM print NUM lines of leading context
-A, --after-context=NUM print NUM lines of trailing context
-C, --context=NUM print NUM lines of output context
-NUM same as --context=NUM
--color[=WHEN],
--colour[=WHEN] use markers to highlight the matching strings;
WHEN is 'always', 'never', or 'auto'
-U, --binary do not strip CR characters at EOL (MSDOS/Windows)
Broadcom FOS-911c-RN
12
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
6.1 Certifications
FOS v9.1.1a is the first Fabric OS release at the 9.x level which is submitted for Common Criteria certification.
6.2 Hardware
There is no new hardware supported with FOS v9.1.1.a
6.3 Software
6.3.2 Enhancements
FOS v9.1.1a includes the following enhancements, described in more detail below:
Allow admin access via console with "enableadminlockout"
SSL CA certificate bundle update
The command enableadminlockout is enhanced to allow configuration of login via console access even when the
admin account has been locked out. This configuration is optional and not enabled by default.
The SSL CA certificate bundle in FOS is updated with FOS v9.1.1a. Expired CA certificates are removed, and new CA
certificates are added.
For the list of changes in the SSL CA certificate bundle, see CA Certificate Bundle Updates.
Broadcom FOS-911c-RN
13
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
7.1 Certifications
FOS v9.1.1 is the first Fabric OS release at 9.x level which is submitted for FIPS 140-3 level 1 certification.
7.2 Hardware
The following section lists hardware introduced with this release.
7.2.1 Platforms
FOS v9.1.1 supports the same Brocade Gen 6 and Gen 7 Fibre Channel platforms supported in FOS v9.1.0x.
Gen 6 and Gen 7 platforms which ship from factory with FOS v9.1.1 are configured with Default Secure, only allowing
secure protocols to access the switch management interface, consequently the following protocols are blocked:
SNMPv1 and SNMPv2
Telnet
FTP
HTTP
NOTE The end user can configure the switch to allow unsecure protocols.
NOTE The 32G ELWL SFP+ XBR-000479 is not compatible with the previously released 32G ELWL SFP+
XBR-000478.
Broadcom FOS-911c-RN
14
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
7.3 Software
The following section lists software changes with this release.
7.3.2 Enhancements
FOS v9.1.1 includes the following enhancements, described in more detail below:
Increase Trunking deskew for 8G, 16G or 32G speeds and LD/LS ports
Switch decommission support
FOS security hardening
Support for XML license install with USB
License export command for v4 (XML format) licenses
REST Enhancements
Broadcom FOS-911c-RN
15
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
7.3.2.1 Increase Trunking deskew for 8G, 16G, or 32G Speeds and LD/LS Ports
In FOS v9.0.x, the trunk deskew value on Gen 7 platforms is set to 300ns regardless of port speed. As a result, trunking
would not form when a Gen 5/6 platform was replaced with a Gen 7 platform but retained existing cabling and DWDM at
8/16/32G speeds.
Change in FOS v9.1.1:
When the E_Port speed is 8G, 16G or 32G, the legacy trunk deskew value (2550ns) is applied.
When the E_Port speed is 64G, the trunk deskew value remains 300ns.
When the E_Port is configured as LD/LS mode regardless of the speed (64G, 32G, 16G, or 8G), the legacy trunk
deskew value (2550ns) is applied.
Switch decommissioning is provided for customers who want to erase all data on the switch prior to physically
decommissioning the switch.
This is a destructive operation requiring a Decommission Authorization Code (DAC) from Brocade TAC.
Following the execution of this operation, the switch will be unusable and unrecoverable.
Example:
switch:admin> switchdecommission
This operation will erase the firmware on the switch, and it should be returned to the
service provider.
***********************************************************************
Please contact your service provider for a special authorization code.
License ID : (10:00:c4:f5:7c:16:9c:94)
**********************************************************************
Enter decommission authorization code(DAC):
Authorization successful. Switch decommission started......
/****************************************************************/
Switch decommission has started. Please do not power off the switch.
Switch Decommission is completed.
Please return the switch to the service provider.
/*******************************************************************/
To provide additional security in FOS, the following commands have been removed:
– awk
– du
– find
– head
– kill
– pidof
Broadcom FOS-911c-RN
16
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
– rpm
– sed
The following commands are hardened in FOS v9.1.1 by restricting and confining them to only execute specific functions
and prohibiting the command from accessing the root shell:
cat
fosredirout
grep
less
ls
more
rm
scp
touch
Installation of licenses in XML format (version 4 licenses) are now supported with a USB.
The following is an example of the CLI syntax:
license --install {-key <lic_key>} |{-usb <lic_path>} | {-h <hostip> -t <protocol> [-m <server_port_number>] -u <user>
[-p <password>] -f <filepath/xmlfile>}
NOTE Prior to executing the license –install –usb command, you must first enable the USB storage
by executing the command usbstorage -enable.
The REST URIs covering the following commands have been updated to provide full parity with the CLI:
devicelogin
fabstatsshow
mapsdb
portshow (Extension not included)
portstats64show
sfpshow
switchshow
Broadcom FOS-911c-RN
17
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
NOTE On Brocade G620, G630, Brocade X6-8, and Brocade X6-4 platforms, this license enables the use of
IO Insight capability. The license itself is identified as “Fabric Vision and IO Insight” on these
platforms.
FICON Management Server – Also known as CUP (Control Unit Port), this license enables host control of switches in
mainframe environments.
Integrated Routing – This license allows any Fibre Channel port in a Brocade X7-4, X7-8, G720, G730 and G620 to be
configured as an EX_Port supporting Fibre Channel Routing (FCR).
Integrated Routing Ports on Demand – This license allows any Fibre Channel port in a Brocade 7810, G630, X6-8, or
X6-4 to be configured as an EX_Port supporting Fibre Channel Routing. The maximum number of EX_Ports supported
per platform is provided in the license.
ICL POD License – This license activates ICL ports on X6 or X7 platform core blades. An ICL license must be installed
on the director platforms at both ends of the ICL connection.
On the Brocade X6-8:
The first ICL POD license enables 8 UltraScale ICL QSFP ports on each core blade of the X6-8 director, which are
QSFP port numbers 0-3 and 8-11. The second ICL POD license enables all UltraScale ICL QSFP ports on each core
blade of the director.
On the Brocade X6-4:
On the X6-4, the first ICL POD license enables 4 UltraScale ICL QSFP ports on each core blade of the director, which
are QSFP port numbers 0, 1, 4, and 5. The second ICL POD license enables all UltraScale ICL QSFP ports on each
core blade of the director.
Broadcom FOS-911c-RN
18
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
The following licenses are available in Fabric OS v9.1.x as either universal temporary or regular temporary licenses:
Fabric (E_Port)
Extended Fabric
Trunking
Integrated Routing
Integrated Routing Ports on Demand
FICON Management Server (CUP)
Fabric Vision
Extension Upgrade
NOTE Temporary licenses for features available on a per-slot basis enables the feature for all slots in the
chassis.
Temporary and universal temporary licenses have durations and expiration dates established in the licenses themselves.
FOS will accept up to two temporary licenses and a single universal license on a unit. Universal temporary license keys
can be installed only once on a particular switch, but they can be applied to as many switches as desired. Temporary use
duration (the length of time for which the feature will be enabled on a switch) is provided with the license key. All universal
temporary license keys have an expiration date after which the license can no longer be installed on any unit.
Temporary or universal temporary licenses for Extension Upgrade do not enable additional ports on 7810.
Broadcom FOS-911c-RN
19
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Broadcom FOS-911c-RN
20
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Broadcom FOS-911c-RN
21
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
10.1.1.1 Loading FOS PSDs via Web Tools or FOS Command Line
Installing a FOS PSD image on a switch is performed in the same manner as using a traditional full FOS image. If a FOS
PSD image is loaded on an incorrect switch model (for example, attempting to load a FOS PSD image for a Gen 6 entry-
level switch on a Gen 6 Director), the following error message displays:
Cannot download the requested firmware because the firmware doesn't support this platform. Please enter another
firmware.
Brocade SANnav™ Management Portal v2.1.1 or earlier does not support FOS PSD images. However, FOS PSD images
are supported with SANnav v2.1.1.3 and later releases. SANnav v2.1.1.3 and later can both host and install FOS PSD
images onto Brocade switches.
Broadcom FOS-911c-RN
22
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
v9.1.1c_G6G7_DIR.zip Fabric OS v9.1.1c for Windows to install on X6-8, X6-4, X7-8 and X7-4 platforms
The image files for each respective platform can be downloaded from your switch vendor’s website and
https://support.broadcom.com/, except for YANG files which are available on https://www.broadcom.com/products/fibre-
channel-networking/software/fabric-operating-system.
NOTE For Brocade X6, G630, X7, and G730 a valid Trusted FOS (TruFOS) Certificate is required to
upgrade to FOS v9.1.x. For details on how to obtain a TruFOS Certificate, see Brocade Trusted FOS
(TruFOS) Certificate.
Broadcom FOS-911c-RN
23
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Table 1 Gen 6 and Gen 7 Platforms and Supported Firmware Downgrade Versions from Fabric OS v9.1.x
Platforms Fabric OS v9.1.x Fabric OS v9.0.x Fabric OS v8.2.x
Brocade G720 (Switch Type 181.5) Supported Not Supported Not Supported
(Fabric OS v9.1.1 and
later)
Brocade G730 (Switch Type 189.8) Supported Not Supported Not Supported
Brocade G610 (Switch Type 170.4 or higher) Supported Supported Not Supported
(Fabric OS v9.0.1b and
later)
Brocade G620 (Switch Type 162) Supported Supported Supported
Brocade G620 (Switch Type 183.5) Supported Not Supported Not Supported
(Fabric OS v9.1.1 and
later)
Brocade G630 (Switch Type 173) Supported Supported Supported
Brocade X6-4 (Switch Type 165.5) Supported Not Supported Not Supported
(Fabric OS v9.1.0b
and later)
Brocade X6-8 (Switch Type 166.5) Supported Not Supported Not Supported
(Fabric OS v9.1.0b
and later)
Broadcom FOS-911c-RN
24
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
When upgrading a Gen 7 director or switch (X7-4, X7-8, G730, G720) to FOS v9.1.x, it is recommended to upgrade to
FOS v9.1.1c. For additional information see TSB 2023-289-A.
During a firmware downgrade from v9.1.x to a pre-v9.1.0 firmware version, a transitory SEC-3089 error message may be
displayed after firmwaredownload completes, but before a reboot is done.
The following platforms cannot be downgraded from FOS 9.1.1:
Brocade G620 (switchType 183.5)
Brocade G720 (switchType 181.5)
In FOS 9.1.x when performing firmwaredownload, the HA reboot triggers the broadcast message “The system is
going down for reboot NOW!” -this is a standard Linux message when a system is doing a graceful shutdown.
This is non-disruptive to IO-traffic during this process.
Example below:
Refer to the Brocade Fabric OS Software Upgrade User Guide for detailed instructions on non-disruptive and disruptive
upgrade procedures.
Prior to downgrading to a pre-v9.1.1 firmware version, any 64G LWL secure SFP must be removed. Firmware downgrade
with 64G LWL secure SFP inserted fails since the SFP is not supported pre-v9.1.1. If attempted, remove the 64G LWL
secure SFP and retry firmwaredownload.
Broadcom FOS-911c-RN
25
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
This chapter contains information that you should consider before you use this Fabric OS release.
11.1 Scalability
All scalability limits are subject to change. Limits may be increased once further testing has been completed, even after
the release of this version of the Fabric OS software. For current scalability limits for Fabric OS software, refer to the
Brocade SAN Scalability Guidelines for Brocade Fabric OS 9.X document.
11.2 Compatibility/Interoperability
This section describes important compatibility and interoperability across Brocade products.
NOTE Web Tools will always show English language irrespective of Browser or Operating System language
setting.
Broadcom FOS-911c-RN
26
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
For the latest support and posting status of all release of Brocade Fabric OS, refer to the Brocade Software: Software
Release Support and Posting Matrices published to the Brocade Product End-of-Life web page
https://www.broadcom.com/support/fibre-channel-networking/eol.
Broadcom FOS-911c-RN
27
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
NOTE Fabric OS v9.1.x support SNMPv1 and SNMPv3, SNMPv2 deprecated in Fabric OS v9.0.1a, SNMP
walk using SNMPv2 is blocked in Fabric OS v9.1.x.
1
Brocade G648 is also supported with FOS v8.2.0_gft release.
2
Brocade MXG610 is also supported with FOS 8.1.0_lnx2, 9.0.1a, and 9.1.0b.
Broadcom FOS-911c-RN
28
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
YANG is a standard data modelling language that defines the data sent over the FOS REST API. Each FOS REST API
module is defined in a YANG module file with a .yang name extension. To download the Brocade FOS-specific YANG
files from the Broadcom website, perform the following steps:
1. Go to https://www.broadcom.com/products/fibre-channel-networking/software/fabric-operating-system/.
2. Select Downloads.
3. The YANG files can be located under the Yang Modules.
4. Unzip or untar the Fabric OS package file; the yang.tar.gz file contains the collection of YANG module files that
this FOS release version supports. Untar the yang.tar.gz file to obtain individual YANG module files.
Alternatively, the YANG modules for a specific FOS version can be downloaded from
https://github.com/brocade/yang.
Broadcom FOS-911c-RN
29
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Emulex 16G Emulex 32G Emulex Gen 7 QLogic 16G QLogic 32G
Adapter Adapter Adapter Adapter Adapter
D_Port tests will fail between a port with a 64G optic on a switch or director operating with FOS v9.0.1b and a port on a
G720, X7, G620 (switchType 183), or G630 (switchType 184) operating with FOS v9.0.0x. Any of these platforms
operating with FOS v9.0.0x should be upgraded to FOS v9.0.1a or later prior to running D_Port tests to a 64G optic.
If Diagnostic POST is enabled, supportSave should not be started until the POST tests are completed after a switch
or director boots up. Starting supportSave collection when POST tests are still running can result in unpredictable
behaviour.
11.3.6 DWDM
For best performance and resiliency when deploying native FC ISLs over DWDM, best practice is to deploy distinct
ISLs over DWDM with in-order delivery (iodset) configured on the switches.
Trunking over DWDM is not generally recommended due to the risk of out-of-order frame delivery. Trunking relies on
deterministic deskew values across all trunked links to provide in-order delivery as well as FC primitives for trunk
formation. These deskew values cannot be guaranteed with DWDM equipment in the path.
Use of trunking over DWDM links should only be done when validated and supported by the DWDM vendor.
With Gen 7 switches, the permitted deskew (variance in latency due to difference in cable length) is less at 64G
compared to lower interface speeds.
2
Adapter firmware or driver versions that are later than the ones listed in the table may not work.
Broadcom FOS-911c-RN
30
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
The recommended interface speed configuration for a Brocade Gen 6 or Gen 7 switch or director chassis is 1G auto-
negotiate.
If a Brocade switch management interface is running at 10 Mb/s, certain FOS operations such as
firmwaredownload may fail.
The 10Gb/s management interface on CPX6 blades is not supported.
Half-duplex mode is not supported in FOS v9.x and is blocked.
The ethif --reseterror command option is not supported in FOS v9.0.x.
The ethif --reseterror command option is supported in FOS v9.1.x.
11.3.8 Extension
Extension between a Brocade 7810 or SX6 running FOS v9.x and a Brocade 7840 is supported only if the 7840 is running
FOS 8.2.1 or later. The following table documents the combinations.
11.3.9 FCoE
The following topologies for FCoE on the FC32-64 are not supported with FOS 9.1.x:
Cisco UCS server directly connected to the FC32-64 without a Fabric Interconnect module.
Cisco UCS server with a Fabric Interconnect module connected to the FC32-64 via a Nexus 5000 series switch in
between. Neither running FCoE NPV mode nor L2 switching mode on the Nexus 5000 is supported.
FCoE devices are supported in edge-to-edge fabric topology. They are not supported in edge-to-backbone fabric
topology over FCR configurations.
11.3.10 FC-NVMe
FC-NVMe is supported in edge-to-edge fabric topology with device type information (e.g. Initiator or Target) over FCR
configurations.
FC-NVMe is supported in edge-to-backbone fabric topology without device type information over FCR configurations.
Broadcom FOS-911c-RN
31
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
FEC is mandatory with Gen 6 and Gen 7 Fibre Channel operating at 32Gb/s or higher bandwidth. This means that the
portcfgfec command applies only to ports that are running at 16Gb/s or 10Gb/s.
FEC capability is not supported with all DWDM links. This means that FEC may need to be disabled on 16Gb/s or
10Gb/s ports when using DWDM links with some vendors. This is done using the portcfgfec command. Failure to
disable FEC on these DWDM links may result in link failure during port bring-up. Refer to the Brocade Fabric OS 9.x
Compatibility Matrix for supported DWDM equipment and restrictions on FEC use.
To upgrade the FPGA on the CR64 blades perform the following steps:
1. Perform the following command to verify current FPGA code level fpgaupgrade --latest
2. Verify the current FPGA code level is lower than 0x01.0a for the CR64 blade slots
• Slot 7 and 8 on X7-8
• Slot 5 and 6 on X7-4
After verification proceed to the next step.
3. Verify both CR64 blades are online with the command slotshow.
4. Prepare for upgrade of the FPGA on the first CR64 blade with the command portdecom <ICL port> -qsfp
perform this for all connected E-ports (ICL ports) on the CR64 blade.
5. Disable the first CR64 blade on which the ICL ports were decommissioned in the previous step portdisable -
s <core blade slot #>.
6. Upgrade the FPGA on the first CR64 blade with the command fpgaupgrade -s <core blade slot #>
a. Respond Yes to automatically power-off and power-on the blade.
i. Do you want to power-off and power-on the slot # automatically, after
FPGA and/or CPLD upgrade (y/[n])?:
b. In case you respond No to automatically power-off and power-on the blade perform these steps manually.
i. slotpoweroff <core blade slot #>
ii. slotpoweron <core blade slot #>
7. Verify the FPGA on the first CR64 blade is upgraded with the command fpgaupgrade –latest.
a. Verify the FPGA code level is 0x01.0a
8. Enable the first CR64 blade with the command portenable -s <core blade slot #> (as needed).
9. Persistently enable all ICL ports on the CR64 blade (which were disabled in step 5 prior to the upgrade)
portcfgpersistentenable <ICL port>.
Repeat this step for all connected E-ports (ICL ports) on the CR64 blade.
10. Verify the ICL ports are online with the command switchshow.
11. Repeat steps 4 through 11 on the second CR64 blade.
The FPGA upgrade is now complete.
Broadcom FOS-911c-RN
32
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
11.3.14 Security
The security enhancements in this section all apply to both FOS v9.0.x and FOS v9.1.x
FOS v9.0.x and v9.1.x require passwords for admin and user accounts to be changed from the default password
string “password”. In the following scenarios, default password may still be present in FOS v9.0.x and v9.1.x. It is
recommended to change the password in this scenario or at the next login prompt:
– A default password is used in an earlier FOS version (prior to v9.0.0). FOS is upgraded from the earlier FOS
version to FOS v9.x.
– A default password is used in an earlier FOS version on active CP. The standby CP runs FOS v9.x and becomes
active due to HA failover.
– A default password is used in an earlier FOS version. Password is distributed from the earlier FOS version to
FOS v9.x.
It is recommended to reconfigure shared secrets for F_Port authentication between Access Gateway and switch
before firmware upgrade to FOS v9.x. The shared secrets should be configured as given in the following table.
Access Gateway FOS Version Edge Switch FOS Version Shared Secret Configuration
Pre-9.0.0 9.0.0 or later AG local secret = Switch local secret
AG peer secret = Switch peer secret
9.0.0 or later 9.0.0 or later AG local secret = Switch peer secret
AG peer secret = Switch local secret
It is recommended to reconfigure shared secrets for F_Port authentication between HBAs and a switch before the
switch is upgraded to FOS v9.0.0 or later. Without reconfiguration, shared secrets configured in earlier FOS versions
will fail F_Port authentication when a device port resets. The shared secrets should be configured as given in the
following table.
FOS Version Shared Secret Configuration
FOS v9.x does not support F_Port authentication to Marvell QLogic BR series (Former Brocade Product Line) HBAs
as these HBAs only support legacy Brocade F_Port authentication. For these devices to connect to FOS v9.x, F_Port
authentication must be disabled.
FOS v9.x does not support F_Port trunking when F_Port authentication is enabled
Prior to upgrading to FOS v9.x:
– First, ensure the secrets on both the switches (E-port authentication) are not the same. Otherwise, the E-port will
segment after the upgrade to 9.x
– Secondly, reconfigure shared secrets to be in compliance with FC-SP 2 standard
If users configure any duplicated Virtual Fabric (VF) list with ldapcfg –mapattr <ldaprole> command,
only the first mapping from the list will be used during LDAP authentication and authorization.
FOS 9.x requires role mapping or VSA attributes to be configured for LDAP user authentication in a VF-enabled
switch. In a non-VF switch, ldapcfg --maprole is mandatory. It should be configured before upgrading to
FOS v9.x to avoid login failure for LDAP users.
Users must specify the domain of an LDAP server when adding the LDAP server to the remote AAA configuration of a
switch.
Broadcom FOS-911c-RN
33
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Optional certificate extensions, such as BasicConstraints, KeyUsage, and ExtendedKeyUsage are ignored when a
certificate containing these is imported in basic mode. During session establishment, the extensions are validated.
Hence, invalid extensions will be rejected and result in session failure.
Login of LDAP users using Distinguished Name (DN) will be supported only for the users created in container “Users”
of the domain configured in the switch, even though the switch is configured with Global Catalog (GC) port of the
server. Login using User Principal Name (UPN) and sAMAccountName will be supported irrespective of the domain
and OU on which the user is created.
11.3.15 Zoning
When performing configdownload with a file that contains unsorted zone membership, any unsorted members will be
automatically sorted in the system when configdownload completes. As a result, when a switch is later re-enabled,
port segmentation may occur due to adjacent switches having the same zones with unsorted membership lists. Users
can recover from segmentation by executing cfgDisable, cfgClear, and cfgSave operations in order to clear the zoning
database from the switch that just performed ‘configdownload’. After segmented ISL ports are re-enabled, zone merge
can proceed.
NOTE These steps should ONLY be performed if the zone database is the same on the configdownload
switch as it is on the rest of the fabric.
11.3.17 Miscellaneous
After a power supply unit is removed from a Brocade G620, the historyshow command may miss the entries for
this FRU removal or insertion event. In addition, the RASLog error message EM-1028 may be logged when the power
supply is removed. This condition can be corrected by power-cycling the switch.
After running offline diagnostics mode 1 on QSFP ports, a Brocade G620 must be rebooted before operational use.
After running offline diagnostics with portledtest, portloopbacktest, or turboramtest commands on
FOS v9.x, Brocade G630 with swtichType 184 must be rebooted before operational use.
All links in an ICL QSFP connection on a Brocade X6 Director must be configured to the same speed using the
portcfgspeed command from one of the following supported speeds: 16Gb/s, 32Gb/s, or ASN. To connect an ICL
from an X6 with a 4x32GFC breakout optic (P/N 57-1000351-01) or a 4x16G FC optic to a 4x16G FC optic in a DCX
8510, the X6 port’s speed must be set to 16Gb/s.
Brocade G630 LEDs illuminate amber and green during power-up.
The CLI command option snmpconfig -set accesscontrol is planned to be deprecated in the next major
release.
When replacing a FC32-64 blade with a FC32-48 blade, flexport and FCoE configurations should be removed before
the FC32-64 blade is removed.
Broadcom FOS-911c-RN
34
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Enhanced checks are performed on optics during firmware upgrade to FOS v9.0.0 or later. Firmware download is
blocked if unsupported optics are discovered. The scanning of the optics takes a few minutes to complete. The
amount of time it takes is dependent on the number of ports on a switch. On a fully loaded eight (8) slot director, it can
take up to five (5) minutes to complete. In addition, ports with optics that fail the enhanced checks in FOS v9.x will not
be able to come online due to the optics as invalid module.
Brocade G620 with switchType 183 and G630 with switchType 184 do not support the following legacy optical
modules:
– 16G SWL (HAA1, HAA2 serial number)
– 16G LWL (HDA1, HDA2, HDA3 serial number)
– 32G QSFP SWL (ZTA serial number)
The following examples show the sfpShow CLI outputs with the serial numbers of the legacy optical module
sfpshow <port> -f
...
Serial No: HAA11213107BTY2
...
sfpshow <port> -f
....
Serial No: HDA318014000DN1
....
sfpshow <port> -f
....
Serial No: ZTA11517000001K
All user ports in a Gen 7 ICL QSFP port must be assigned to the same logical switch when Virtual Fabric is
configured. Port 0 of the ICL QSFP must be enabled first before port 1, port 2, and port 3 within the same QSFP to be
enabled. If port 0 of the Gen 7 ICL QSFP becomes offline, port 1, port 2, and port 3 of the QSFP will become offline
as a result.
All user ports in a Gen 7, 2KM ICL QSFP port must be assigned to the same logical switch when Virtual Fabric is
configured. Port 3 of the ICL QSFP must be enabled first before port 0, port 1, and port 2 within the same QSFP to be
enabled. If port 3 of the Gen 7, 2KM ICL QSFP becomes offline, port 0, port 1, and port 2 of the QSFP will become
offline as a result.
The output of CLI command sfpShow or any other interfaces to retrieve information from Gen 7 SWL QSFP (Part
Number 57-1000490) and LWL QSFP (Part Number 57-1000491) does not match the Part Numbers on the media
sticker labels. The output shows Gen 6 Part Number (57-1000351 for SWL or 57-1000480 for LWL). This does not
affect operation of the optics.
When a fabric with FOS v9.x is connected to a fabric with pre-FOS v9.0.0, RASLOG message FABR-1001 is
generated as shown in the following example. This is an expected message. There is no impact on the ISL
functionality.
[FABR-1001], 35, FID 128, WARNING, port 62, incompatible VC count
FOS v9.x has disabled directory listing in CLI shell. As a result, entering <tab><tab> key does not list all CLIs
available. Users can enter help command to list the commands. The shell tab completion by entering the first letter
followed by <tab> key is supported.
The FCR support of “Long Distance Fabric” mode conflict cannot coexist with long distance port configuration. If long
distance mode (LD, LS, or LE) is enabled on the EX_Port and the EX_Port detected Backbone Fabric's "Long
distance fabric" configuration is different from the connected Edge Fabric's "Long distance fabric" configuration, then
the EX_Port will be disabled.
If “Long Distance Fabric” is enabled on a switch via the configure command, it is recommended to upgrade the
switch from FOS v8.2.x directly to FOS v9.0.0a or later. If the “Long Distance Fabric” configuration is enabled on an
E_Port or EX_Port, firmware upgrade or downgrade to FOS v9.0.0 will effectively cause the “Long Distance Fabric”
configuration to be disabled.
If an HTTPS certificate is installed on a switch in FOS v9.x, HTTP access is blocked by default as HTTPS access is
supported.
Broadcom FOS-911c-RN
35
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
When portloopbacktest mode1 test runs on multiple Gen 7 ICL ports with multiple iterations, the test may fail.
The workaround is to run the test on one ICL port at a time with a reduced number of iterations.
Running long distance LE mode between any blades or switches among FC32-X7-48, FC64-48, or G720 with port
QoS mode enabled and vc_translation_link_init mode enabled may result in frame timeouts. The
workaround for this problem is to use LS or LD mode for long distance.
If downloading firmware on an unsupported platform, a write post to /rest/operations/show-status/message-id/20000
occurs and will incorrectly concatenate firmware download error messages. No recovery is needed, and this
behaviour will not cause any functional impact.
Brocade G620 with switchType 183, G630 with switchType 184, and FC32-X7-48 blades do not support 4G EX-Port.
Brocade G620 with switchType 183, G630 with switchType 184, and FC32-X7-48 blades support 4G E-Port
connected between any of the three listed only
When Connecting Brocade G730 with X7, G720, G620 switchType 183 or G630 switchType 184 these switches
should run FOS v9.0.1c or later.
When performing a configdownload operation this will not overwrite the existing MAPS "Custom RASLog mode"
feature configuration on the switch. For example, if custom raslog mode is disabled in the switch but it is enabled in
downloaded configuration, then the feature will remain disabled in switch and must be manually configured after the
configdownload operation is complete.
In case an NPIV flow is identified as SDDQ or Over Subscribed (and moved by Traffic Optimizer to an OS PG), the
flow movement may cause some frames to be delivered Out of Order (OOO). In general, open systems devices have
no issues when this happens.
In FOS v9.1.1, CPX blades in X6 Switch Type 165.5 and 166.5 and X7 are displayed as CPX7 in slotshow
command output.
When upgrading from FOS v9.0.x to FOS v9.1.x, the AG ports will be moved from ALL_HOST_PORTS group to
ALL_OTHER_F_PORTS group. Consequently, the MAPS thresholds for ALL_OTHER_F_PORTS will apply to these
ports in FOS v9.1.x. The default thresholds for the groups ALL_HOST_PORTS and ALL_OTHER_F_PORTS are the
same and if these are not changed there is no impact. In case custom thresholds are used and these are configured
differently for the groups ALL_HOST_PORTS and ALL_OTHER_F_PORTS the thresholds (monitoring) for AG ports
are impacted accordingly.
When performing factory reset on an X6/X7, the cipher.syslog key is not reset to factory value.
Consequently, TLS handshake failure messages are displayed ongoing on standby CP:
Message: [SEC-3077], 123, SLOT 1 | CHASSIS, INFO, sw0, Event: TLS SESSION, TLS handshake failed, Info:
certificate verify failed. Host=x.x.x.x
To work around this perform factoryreset in the following way:
1. Factoryreset
2. When TLS handshake failure message is displayed -reboot the standby CP.
When connecting a switch running FOS v9.1.x to a switch running pre FOS v9.1.x firmware, a FSPF-1006 RASLOG
may be reported by the down-level neighbour switch.
The FSPF-1006 RASLOG is reported by the down-level switch since the FSPF version identified by the FOS v9.1.x
switch does not match what the pre FOS v9.1.x switch is expecting. The FSPF version is higher on the neighbour
switch running 9.1.x. This log message is of informational character since the switch running 9.1.x automatically
reverts to use the same code level as the switch running pre FOS 9.1.x firmware.
In FOS 9.1.x, to conform to RFC3315 and RFC5942, the default value of prefix length for IPv6 DHCP address
changed from 64 to 128. The prefix and gateway information are provided by the Router Advertisement (RA) and it is
expected that RA is enabled in the network. If IPv6 RA is not enabled in the network, IPv6 connectivity issues will
occur.
The resolution is to enable RA to resolve IPv6 network connectivity issues.
Broadcom FOS-911c-RN
36
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
On G610 running FOS v9.1.1, in rare cases following a power outage the switch may be stuck in boot with the error
message: “can’t get kernel message”. This may be seen on G610 switches with FOS v9.1.1 only following a power
outage / power cycle. For this reason, it is recommended to run G610 switches on FOS v9.1.1a (or later) or v9.0.1x.
When performing supportSave with SCP as the selected transfer protocol, the command defaults to using SFTP. In
environments where SFTP ports are blocked the supportSave upload will fail.
When upgrading a Gen 7 director or switch (X7-4, X7-8, G730, G720) to FOS v9.1.x, it is recommended to upgrade to
FOS v9.1.1c. For additional information see TSB 2023-289-A.
Broadcom FOS-911c-RN
37
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
This section lists the Common Vulnerabilities and Exposures (CVEs) that have been addressed. Each CVE is identified by
the CVE ID number. For the latest security vulnerabilities disclosures and a description of each CVE, please visit Brocade
Security Advisories web page at https://www.broadcom.com/support/fibre-channel-networking/security-advisories
Brocade Fabric OS version 9.1.1c
CVE-2023-31426
CVE-2023-31427
CVE-2023-31428
CVE-2023-31429
CVE-2023-31430
CVE-2023-31431
CVE-2023-31432
CVE-2023-31926
CVE-2023-31927
CVE-2023-31928
CVE-2018-7738
CVE-2018-25032
CVE-2022-44792
CVE-2020-14145
CVE-2021-3800
CVE-2022-24448
CVE-2022-23219
CVE-2021-45485
CVE-2021-45486
CVE-2021-0146
CVE-2020-36557
CVE-2020-36558
Broadcom FOS-911c-RN
38
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
CVE-2022-0778
In OpenSSL before OpenSSL 3.0.2, OpenSSL 1.1.1n, OpenSSL 1.0.2zd, it is possible to trigger an infinite loop by crafting
a certificate that has invalid elliptic curve parameters.
CVE-2022-28169
A low privilege webtools user could gain elevated admin rights, or privileges, beyond what is intended or entitled for that
user. By exploiting this vulnerability, a user whose role is not an admin, can create a new user with an admin role using
the operator session id. The issue was replicated after intercepting the admin and operator authorization headers sent
unencrypted and editing a user addition request to use the operator's authorization header.
CVE-2022-28170
Brocade Fabric OS Web Application services before Brocade Fabric v9.1.0, v9.0.1e, v8.2.3c, v7.4.2j stores server and
user password in the debug statements.
CVE-2022-33179
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 7.4.2j could allow an attacker to
break out of restricted shells with “set context” and escalate privileges.
CVE-2022-33180
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, could allow an
attacker to export out sensitive files with “seccryptocfg”, “configupload”.
CVE-2022-33181
An information disclosure vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c,
8.2.0cbn5, 7.4.2.j could allow an attacker to read sensitive files using switch commands “configshow” and “supportlink”.
CVE-2022-33182
A privilege escalation vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5,
could allow a local user to escalate its privilege to root using switch commands “supportlink”, “firmwaredownload”,
“portcfgupload, license, and “fosexec”.
CVE-2022-33183
A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow
an attacker to perform stack buffer overflow using in “firmwaredownload” and “diagshow” commands.
CVE-2022-33184
A vulnerability in Brocade Fabric OS fab_seg.c.h libraries could allow authenticated attackers to exploit stack-based buffer
overflows, allowing the execution of arbitrary code as the root user account.
CVE-2022-33185
Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, v9.1.0 use unsafe string function to process
user input. Authenticated attackers can abuse these vulnerabilities to exploit stack-based buffer overflows, allowing
execution of arbitrary code as the root user account.
Broadcom FOS-911c-RN
39
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
CVE-2021-39275
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass
untrusted data to these functions, but third-party/external modules may. This issue affects Apache HTTP Server 2.4.48
and earlier.
CVE-2021-34798
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48
and earlier.
CVE-2021-23841
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the
issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may
occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may
subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function
X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use
this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL
versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j.
OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer
receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2022-0155
Follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor.
CVE-2018-6485
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or
libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading
to heap corruption.
CVE-2017-18018
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a
symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by
leveraging a race condition.
CVE-2014-9984
nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer
when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running
nscd.
Broadcom FOS-911c-RN
40
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding
the string data and a field holding the buffer length. This contrasts with normal C strings which are represented as a buffer
for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are
parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has
been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING
structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL
terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also
happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been
found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings
that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that
ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating
the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing
of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the
OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur
in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an
application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions
then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the
disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected
1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
CVE-2021-3711
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically
an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the
"outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then
allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the
"out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size
required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size
required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a
second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an
application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents
of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The
location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-
1.1.1k).
CVE-2020-29371
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory
leaks to userspace, aka CID-bcf85fcedfdd.
CVE-2015-4042
Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to
cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
CVE-2015-4041
The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size
calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a
denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long
UTF-8 strings.
Broadcom FOS-911c-RN
41
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
CVE-2018-5764
The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses,
which allows remote attackers to bypass an argument-sanitization protection mechanism.
CVE-2017-16548
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an
xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application
crash) or possibly have unspecified other impact by sending crafted data to the daemon.
CVE-2017-17434
The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the
daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths
protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c),
which allows remote attackers to bypass intended access restrictions.
Broadcom FOS-911c-RN
42
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Broadcom FOS-911c-RN
43
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
FOS-849643 ISL ports become disabled when connecting FOS 8.x with FOS 7.x switch after updating Enhanced Object Zoning.
switchshow as below: Index Port Address Media Speed State Proto
================================================== 28 28 011c00 id 8G No_Sync FC
Disabled (ESC Enhanced Zone Object Name Conflict)
FOS-849645 Network Patroller daemon (NPD) terminated even though the flow monitor was disabled via CLI "flow --deactivate
sys_flow_monitor".
FOS-849852 G610 fails to boot after power outage with reason "ERROR: can't get kernel image!"
FOS-849917 On a G730 there is a probability of the switch getting into Credit loss (GE5-1012). Subsequent Link reset (GE5-
1014) recovers the credit loss.
FOS-850134 This issue is specific to Gen7 chassis systems (X7-4, X7-8). Traffic optimizer related software verify errors (RAS-
1004) and kernel panic might be observed.
Defect ID Description
FOS-837451 DWDM is reporting a "loss of lock" error and the switch is showing no light on the port.
FOS-839186 Code upgrade turned into cold recovery when weblinker cannot restart in time, or on a normal operation switch,
user may encounter failures in config change operations (e.g. portcfg or lscfg)
FOS-839936 User may encounter a CP Assert, upon initial failover to Fabric OS v9.x
FOS-840370 Firmwareupgrade via SANnav failed due to time-out from a busy standby CP.
FOS-840717 High CPU usage reported on SNMP daemon.
FOS-840909 FCPH-1003 Raslog reports duplicate port WWN with a port that does not have the same port WWN.
FOS-840971 If switch uptime is more than 99 days, then only the first two digits of the uptime days is displayed in Dashboard.
FOS-841163 User can't perform firmware download on the switch from the SANNav.
FOS-841478 Duplicate PWWN detection resulted in disruption to the existing FICON CHPID.
FOS-841961 On a X7 director that had gone through CLI "firmwarecleaninstall" of FOS9.0.x, after an upgrade to FOS v9.1.x,
the active CP will show FAULTY (53) and will essentially be unresponsive. No output on the serial console. The
management and service ports are no longer accessible.
FOS-841985 Unable to capture supportsave via Sannav.
FOS-842035 'Launch the Web Tools application' step is unnecessarily displayed in 'Support Data Collection' screen.
FOS-842160 Performing a firmwarecleaninstall to FOS v9.1.0b or FOS v9.1.1 from any other version prior to FOS v9.1.0b will
fail. Firmware upgrades to these same versions will succeed.
Broadcom FOS-911c-RN
44
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
FOS-842607 MXG610s embedded switch panics after Fabric Resource Director daemon (fredd) crashes or holds a large
amount of memory.
FOS-843396 SNMP password has to be set twice.
FOS-843643 Web tools cannot save zone configurations when launched from the Dell Chassis UI
FOS-844393 Enabling DHCP from Static (v4) does not reflect the DHCP ipv4 address on embedded blade switches supported
on HPE synergy chassis.
FOS-844483 Following a power outage the switch may stay stuck in boot with the error message: "Can't get the kernel image"
FOS-844625 Configdownload fails on embedded platforms.
FOS-844849 Credit loss observed on ISL link between two G730 switches
Defect ID Description
FOS-825993 Failure status should be sent, if SS fails on any of the CP
FOS-826227 Devices in default allaccess zone cannot communicate to each other across LISLs in FICON environment on all
platform.
FOS-832042 Brocade 7810 switch panics or hangs on boot up.
FOS-833824 The "Max UDP conn exceeded" counter in the output of "lan-stats –global" remains always at 0 even though the
number of running UDP flows are more than the supported emulated UDP flows.
FOS-834530 Switch panics during adding aliases to zone configuration.
FOS-835586 SNMP consumes more CPU cycles, resulting in MAPS alerts.
FOS-835781 D-Port test is stuck in "In Progress" on 32G ADVA DWDM links.
FOS-835809 'Unmount USB Drive' option is displayed in WebEM after USB device is inserted. User would not be able to use
the USB device connected to the switch as there is no option to mount the device.
FOS-835872 The output for the "ficonshow rnid" and "ficonshow rnid table" CLI does not include Node Descriptors for online E-
Ports.
FOS-835998 tsclockserver Active server shows as NONE on non-principal switches however working fine on Principal switch
with legacy mode disabled. Similarly, tsclockserver Active server shows as NONE when set to LOCL in legacy
mode disabled.
FOS-836031 Switch panic after FDMI daemon terminated.
FOS-836043 Director-class switches returning chassis S/N when being queried for brocade-chassis info via REST, when WWN
1 S/N was previously returned and used for entitlement.
FOS-836077 On Standby CP, lines with '0's appear on console during hot code load.
FOS-836219 CLI "sfpshow -all" did not display complete output and the polling of smart SFP data stopped. It reported an very
old "Last poll time:"
FOS-836265 During code upgrade from FOS v8.2.1x to FOS v8.2.3x, FOS cannot completely be brought up due to cald core
dumps. User observes the switch hanging.
FOS-836313 The session which gets modified to HTTPS from HTTP based session, gets terminated when HTTP protocol is
disabled after HTTPS certificate generation.
FOS-836339 REST GET operation on brocade-security/sshutil-public-key fails with error "Named account does not exist"
FOS-836369 D-Port test does not start on the secondary port links of a 53G BMF QSFP, when the test is initiated using
"portdporttest –start" command option on all 4 ports.
FOS-836491 flow CLI does not report TIMEOUT count for an Initiator or Target device.
Broadcom FOS-911c-RN
45
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
FOS-836506 Periodic XTUN-1997 triggers when running FICON and FCP/SCSI flows over an FCIP Tunnel Port Based or
Device Based Routing configuration. The XTUN-1997 triggers are for Keepalive timeouts on the medium priority
circuits.
FOS-836572 'snmpconfig' CLI returns error 'Failed to get snmp config info' due to SNMP service not restarting after getting
disrupted.
FOS-836573 FICN_1062 and FICN_1063 RASLOGs every 1.5 seconds on FICON Emulation enabled FCIP Tunnel
FOS-837183 TX rules for ISL ports do not get triggered for MAPS custom policy that includes both RX and TX rules for the ISL
ports.
FOS-837405 Flow vision reports the wrong direction of flows for the SCSI devices that don't register FC4 features.
FOS-837518 ESMd panic seen when issuing a `portcfgge lan –set -lan` command.
FOS-837563 Brocade G630 switch (Switch type = 184) may experience sudden reboot – resets.
FOS-837583 SNMP daemon leaks memory and causes switch to hafailover/hareboot/panic when switch runs out of memory.
FOS-837755 Stale CAM entries are present on the ports, which were disabled.
FOS-837837 Performance stats for VE ports are not present in connunitportstat table
FOS-837911 Observed switch Panic from UCID termination resulting in UCID core file
FOS-838223 Devices in 64G switch with default allaccess zone cannot communicate to each other in FICON environment.
FOS-838514 7840, 7810 or SX6 blade encounters DP Linux out of Memory causing IO disruption
FOS-839056 Frame drops affecting entire fabric after creating smaller trunks from larger trunks.
FOS-839346 Path loss experienced after FOS upgrade on Access Gateway
FOS-839847 Switch subtype incorrectly displayed
FOS-840535 Link errors observed on port 47 of G620 (switch type 162) during HA upgrade
Broadcom FOS-911c-RN
46
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
GLOBALTRUST 2020
Data:
Version: 3 (0x2)
Serial Number:
5a:4b:bd:5a:fb:4f:8a:5b:fa:65:e5
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020
Validity
Not Before: Feb 10 00:00:00 2020 GMT
Not After : Jun 10 00:00:00 2040 GMT
Certificate Name:
ANF Secure Server Root CA
Data:
Version: 3 (0x2)
Serial Number: 996390341000653745 (0xdd3e3bc6cf96bb1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: serialNumber=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure
Server Root CA
Validity
Not Before: Sep 4 10:00:38 2019 GMT
Not After : Aug 30 10:00:38 2039 GMT
Certificate Name:
Certum EC-384 CA
Data:
Version: 3 (0x2)
Serial Number:
78:8f:27:5c:81:12:52:20:a5:04:d0:2d:dd:ba:73:f4
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA
Validity
Not Before: Mar 26 07:24:54 2018 GMT
Not After : Mar 26 07:24:54 2043 GMT
Certificate Name:
Certum Trusted Root CA
Data:
Version: 3 (0x2)
Serial Number:
1e:bf:59:50:b8:c9:80:37:4c:06:f7:eb:55:4f:b5:ed
Signature Algorithm: sha512WithRSAEncryption
Issuer: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA
Validity
Not Before: Mar 16 12:10:13 2018 GMT
Not After : Mar 16 12:10:13 2043 GMT
Broadcom FOS-911c-RN
47
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
TunTrust Root CA
Data:
Version: 3 (0x2)
Serial Number:
13:02:d5:e2:40:4c:92:46:86:16:67:5d:b4:bb:bb:b2:6b:3e:fc:13
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA
Validity
Not Before: Apr 26 08:57:56 2019 GMT
Not After : Apr 26 08:57:56 2044 GM
Certificate Name:
HARICA TLS RSA Root CA 2021
Data:
Version: 3 (0x2)
Serial Number:
39:ca:93:1c:ef:43:f3:c6:8e:93:c7:f4:64:89:38:7e
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021
Validity
Not Before: Feb 19 10:55:38 2021 GMT
Not After : Feb 13 10:55:37 2045 GMT
Certificate Name:
HARICA TLS ECC Root CA 2021
Data:
Version: 3 (0x2)
Serial Number:
67:74:9d:8d:77:d8:3b:6a:db:22:f4:ff:59:e2:bf:ce
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021
Validity
Not Before: Feb 19 11:01:10 2021 GMT
Not After : Feb 13 11:01:09 2045 GMT
Broadcom FOS-911c-RN
48
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
GlobalSign Root CA - R2
Data:
Version: 3 (0x2)
Serial Number:
04:00:00:00:00:01:0f:86:26:e6:0d
Signature Algorithm: sha1WithRSAEncryption
Issuer: OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign
Validity
Not Before: Dec 15 08:00:00 2006 GMT
Not After : Dec 15 08:00:00 2021 GMT
Certificate Name:
QuoVadis Root CA
Data:
Version: 3 (0x2)
Serial Number: 985026699 (0x3ab6508b)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=BM, O=QuoVadis Limited, OU=Root Certification Authority, CN=QuoVadis Root Certification Authority
Validity
Not Before: Mar 19 18:33:33 2001 GMT
Not After : Mar 17 18:33:33 2021 GMT
Certificate Name:
Sonera Class 2 Root
Data:
Version: 3 (0x2)
Serial Number: 29 (0x1d)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=FI, O=Sonera, CN=Sonera Class2 CA
Validity
Not Before: Apr 6 07:29:40 2001 GMT
Not After : Apr 6 07:29:40 2021 GMT
Certificate Name:
DST Root CA
Data:
Version: 3 (0x2)
Serial Number:
44:af:b0:80:d6:a3:27:ba:89:30:39:86:2e:f8:40:6b
Signature Algorithm: sha1WithRSAEncryption
Issuer: O=Digital Signature Trust Co., CN=DST Root CA X3
Validity
Not Before: Sep 30 21:12:19 2000 GMT
Not After : Sep 30 14:01:15 2021 GMT
Broadcom FOS-911c-RN
49
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
Cybertrust Global Root
Data:
Version: 3 (0x2)
Serial Number:
04:00:00:00:00:01:0f:85:aa:2d:48
Signature Algorithm: sha1WithRSAEncryption
Issuer: O=Cybertrust, Inc, CN=Cybertrust Global Root
Validity
Not Before: Dec 15 08:00:00 2006 GMT
Not After : Dec 15 08:00:00 2021 GMT
Certificate Name:
Chambers of Commerce Root - 2008
Data:
Version: 3 (0x2)
Serial Number:
a3:da:42:7e:a4:b1:ae:da
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=EU, L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287, O=AC
Camerfirma S.A., CN=Chambers of Commerce Root - 2008
Validity
Not Before: Aug 1 12:29:50 2008 GMT
Not After : Jul 31 12:29:50 2038 GMT
Certificate Name:
Global Chambersign Root - 2008
Data:
Version: 3 (0x2)
Serial Number:
c9:cd:d3:e9:d5:7d:23:ce
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=EU, L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287, O=AC
Camerfirma S.A., CN=Global Chambersign Root - 2008
Validity
Not Before: Aug 1 12:31:40 2008 GMT
Not After : Jul 31 12:31:40 2038 GMT
Certificate name:
EC-ACC
Data:
Version: 3 (0x2)
Serial Number:
(Negative)11:d4:c2:14:2b:de:21:eb:57:9d:53:fb:0c:22:3b:ff
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=ES, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), OU=Serveis Publics de Certificacio,
OU=Vegeu https://www.catcert.net/verarrel (c)03, OU=Jerarquia Entitats de Certificacio Catalanes, CN=EC-ACC
Validity
Not Before: Jan 7 23:00:00 2003 GMT
Not After : Jan 7 22:59:59 2031 GMT
Broadcom FOS-911c-RN
50
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
Hellenic Academic and Research Institutions RootCA 2011
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and
Research Institutions RootCA 2011
Validity
Not Before: Dec 6 13:49:52 2011 GMT
Not After : Dec 1 13:49:52 2031 GMT
Certificate Name:
Trustis FPS Root CA
Data:
Version: 3 (0x2)
Serial Number:
1b:1f:ad:b6:20:f9:24:d3:36:6b:f7:c7:f1:8c:a0:59
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=GB, O=Trustis Limited, OU=Trustis FPS Root CA
Validity
Not Before: Dec 23 12:14:06 2003 GMT
Not After : Jan 21 11:36:54 2024 GMT
Certificate Name:
GlobalSign ECC Root CA - R4
Data:
Version: 3 (0x2)
Serial Number:
2a:38:a4:1c:96:0a:04:de:42:b2:28:a5:0b:e8:34:98:02
Signature Algorithm: ecdsa-with-SHA256
Issuer: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign
Validity
Not Before: Nov 13 00:00:00 2012 GMT
Not After : Jan 19 03:14:07 2038 GMT
Certificate Name:
GTS Root R1
Data:
Version: 3 (0x2)
Serial Number:
6e:47:a9:c5:4b:47:0c:0d:ec:33:d0:89:b9:1c:f4:e1
Signature Algorithm: sha384WithRSAEncryption
Issuer: C=US, O=Google Trust Services LLC, CN=GTS Root R1
Validity
Not Before: Jun 22 00:00:00 2016 GMT
Not After : Jun 22 00:00:00 2036 GMT
Broadcom FOS-911c-RN
51
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Certificate Name:
GTS Root R2
Data:
Version: 3 (0x2)
Serial Number:
6e:47:a9:c6:5a:b3:e7:20:c5:30:9a:3f:68:52:f2:6f
Signature Algorithm: sha384WithRSAEncryption
Issuer: C=US, O=Google Trust Services LLC, CN=GTS Root R2
Validity
Not Before: Jun 22 00:00:00 2016 GMT
Not After : Jun 22 00:00:00 2036 GMT
Certificate Name:
GTS Root R3
Data:
Version: 3 (0x2)
Serial Number:
6e:47:a9:c7:6c:a9:73:24:40:89:0f:03:55:dd:8d:1d
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Google Trust Services LLC, CN=GTS Root R3
Validity
Not Before: Jun 22 00:00:00 2016 GMT
Not After : Jun 22 00:00:00 2036 GMT
Certificate Name:
GTS Root R4
Data:
Version: 3 (0x2)
Serial Number:
6e:47:a9:c8:8b:94:b6:e8:bb:3b:2a:d8:a2:b2:c1:99
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Google Trust Services LLC, CN=GTS Root R4
Validity
Not Before: Jun 22 00:00:00 2016 GMT
Not After : Jun 22 00:00:00 2036 GMT
Broadcom FOS-911c-RN
52
Fabric OS v9.1.1c Fabric OS v9.1.1c Release Notes Digest
Revision History
Broadcom FOS-911c-RN
53