THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
17-Nov-22 |
Initial Release |
Affected OS Type | Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|---|
NON-IOS |
Application Patches |
23.0 |
23.0.2018.12, 23.0.2019.01, 23.0.2019.02, 23.0.2019.03, 23.0.2019.04, 23.0.2019.05, 23.0.2019.06, 23.0.2019.07, 23.0.2019.08, 23.0.2019.09, 23.0.2019.10, 23.0.2019.11, 23.0.2019.12, 23.0.2020.01, 23.0.2020.02, 23.0.2020.03, 23.0.2020.04, 23.0.2020.05, 23.0.2020.06, 23.0.2020.07, 23.0.2020.08, 23.0.2020.09, 23.0.2020.10, 23.0.2020.11, 23.0.2020.12, 23.0.2021.01, 23.0.2021.02, 23.0.2021.03, 23.0.2021.04, 23.0.2021.05, 23.0.2021.06, 23.0.2021.07, 23.0.2021.08, 23.0.2021.09, 23.0.2021.10, 23.0.2021.11, 23.0.2021.12, 23.0.2022.01, 23.0.2022.02, 23.0.2022.03, 23.0.2022.04, 23.0.2022.05, 23.0.2022.06, 23.0.2022.07, 23.0.2022.08, 23.0.2022.09, 23.0.2022.10 |
Cisco Webex BroadWorks Release 23 |
NON-IOS |
Application Patches |
24.0 |
24.0.2020.07, 24.0.2020.08, 24.0.2020.09, 24.0.2020.10, 24.0.2020.11, 24.0.2020.12, 24.0.2021.01, 24.0.2021.02, 24.0.2021.03, 24.0.2021.04, 24.0.2021.05, 24.0.2021.06, 24.0.2021.07, 24.0.2021.08, 24.0.2021.09, 24.0.2021.10, 24.0.2021.11, 24.0.2021.12, 24.0.2022.01, 24.0.2022.02, 24.0.2022.03, 24.0.2022.04, 24.0.2022.05, 24.0.2022.06, 24.0.2022.07, 24.0.2022.08, 24.0.2022.09, 24.0.2022.10 |
Cisco Webex BroadWorks Release 24 |
Defect ID | Headline |
---|---|
CSCwd55882 | Auto-revert on upgrade failures can leave the server in a broken state |
Auto-revert on upgrade failures can leave the server in a broken state.
When upgrading to a target release of R23.0 or R24.0, if an automatic auto-revert process occurs, the server may be left in an unusable state. Patch AP384127 fixes the auto-revert process.
The server, daemons, CLI and other processes will not start when sudoers is affected or when wrong third party versions are being used.
Customers who upgrade to R23 or R24 should download and apply these corrective patches before attempting an upgrade:
R23
R24
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
My Notifications—Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.
Unleash the Power of TAC's Virtual Assistance