- Overview
- Product Documentation
- CML Release Notes
- Getting Started
- CML 2.1 User Guide
- CML User's Guide
- Overview of CML 2.x
- Using CML and the HTML5 UI
- Dashboard
- Workbench
- Adding Nodes to a Lab
- Starting, Stopping, and Wiping Nodes
- Deleting Nodes
- Creating Links
- Rules for Creating Links and Interface Overprovisioning
- Adding Interfaces and Overprovisioning
- Overprovisioning Interfaces with Link Creation
- Starting Simulations
- Connecting to a Node's Console
- Setting CPU limit on node
- Launch sequencing and CPU limiting
- Stopping Simulations
- External Connectivity for Simulations
- Link Packet Capture
- Breakout Tool
- Custom VM Images
- Creating a New Node Definition
- CML 2.1 Admin Guide
- Resources
CML 2.1.2 Release Notes¶
CML 2.1.2 is a maintenance and bug fix release for CML 2.1.1. It does not contain any new features or functionality. The main purpose of this release was to provide a CML 2.1.x release that is compatible with the current CentOS Linux 8.3 package updates.
This page lists the changes included in the 2.1.2 release. If you are upgrading from CML 2.0.x, be sure to read the entire CML 2.1 Release Notes to understand all of the changes since that release.
Bug Fixes in CML 2.1.2¶
In addition to the fixes in CML 2.1.0 and 2.1.1, the 2.1.2 release fixes the following bugs:
Bug Description |
Resolution |
---|---|
CML 2.1.x incompatibility with CentOS 8.3 updates. The underlying OS of the CML server is CentOS 8. The December 2020 release of CentOS 8.3 introduced some changes that were incompatible with CML 2.1.1. |
Fixed in CML 2.1.2. CML 2.1.2 is now compatible with the current CentOS 8.3 updates. The CML 2.1.2 release is built on CentOS 8.3. If you are upgrading an existing CML server to CML 2.1.2, barring any new known issues (see below), you will be able to apply OS updates as part of the upgrade. |
Vulnerabilities in nginx-1.14. Symptom - All versions of CML 2.x before 2.1.2 include a version of nginx that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
Conditions - Installation with default configuration. PSIRT Evaluation - The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 7.5: https://tools.cisco.com/security/center/cvssCalculator.x?vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE IDs CVE-2019-9511, CVE-2019-9513, and CVE-2019-9516 have been assigned to document this issue. Additional information on Cisco’s security vulnerability policy can be found at the following URL: https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html |
Fixed in CML 2.1.2. CML 2.1.2 includes nginx-1.18, which is not affected by the listed vulnerabilities. |
If your CML server had a custom node definition, then the Download System Archive feature on the page would fail. |
Fixed in CML 2.1.2. |
Known Issues in CML 2.1.2¶
There are no new known issues in CML 2.1.2. See the Known Issues and Caveats for CML 2.1 and the CML 2.1.1 Release Notes for known issues that may still impact the 2.1.2 release.