Manual Chapter : Known Issues

Applies To:

Show Versions Show Versions

F5OS-C

  • 1.1.3
Manual Chapter

Known Issues

Known issues

Open issues

ID Number
Title
Description
Workaround
873497
Message logged during system boot: 18042: No controller found
Symptoms:
System messages say it will reboot after the firmware update but the system does not actually reboot.
Note
: If you try to reboot while the update is in progress, the reboot fails and logs a message indicating that the system is going down for reboot. It does not reboot, however.
Messages displayed:
-- Failed to start reboot.target: Transaction contains conflicting jobs 'stop' and 'start' for systemd-reboot.service. Probably contradicting requirement dependencies configured.
-- See system logs and 'systemctl status reboot.target' for details.
-- Broadcast message from root@localhost on ttyS0 (Tue 2020-01-28 10:18:33 PST):
The system is going down for reboot NOW!"
Conditions:
-- Firmware is being updated.
-- User initiates a system reboot.
Impact:
The system prevents rebooting while the firmware upgrade is in progress, but an erroneous message is logged indicating that a reboot will occur.
Workaround:
Do not attempt to reboot during a firmware update. The message is erroneous and you can safely ignore it.
879325
PCIe correctable errors may be infrequently reported on VELOS BX110 blades
Symptoms:
PCIe correctable errors may be infrequently reported on VELOS BX110 blades due to the Train Cold - Run Hot (TCRH) Compensation Feature being triggered in response to platform temperature changes. This feature utilizes a PCIe PHY layer reset to optimizes performance and data integrity as operating conditions change. Examples of the different types of correctable errors that may be reported include any of the following:
  • Bad DLLP
  • Bad TLP
  • Replay timer timeout (RTTO)
Conditions:
-- Train Cold - Run Hot (TCRH) Compensation Feature triggered in response to platform temperature changes.
-- VELOS BX110 blades.
Impact:
The Train Cold - Run Hot (TCRH) Compensation Feature is an expected behavior on the VELOS BX110 blade and these infrequent correctable errors have no system impact.
Workaround:
None needed. This is a benign message that you can safely ignore.
918781
i8042: No controller found
Symptoms:
During boot, the system logs a message: i8042: No controller found
Conditions:
This occurs during system startup of a VELOS System Controller or Blade.
Impact:
The message is benign, and you can safely ignore it.
Workaround:
None
918789
'Error parsing PCC subspaces' message on the console during boot
Symptoms:
'Error parsing PCC subspaces' appears on the console when the system boots.
Conditions:
Viewing the console on boot.
Impact:
The message is benign and can be ignored.
Workaround:
None
918793
Message 'Failed to start origin-node.service' occurs during boot
Symptoms:
During boot, the system controllers may display the message [FAILED] Failed to start origin-node.service.
Conditions:
The system is booting up.
Impact:
An error is logged, but there are no known negative impacts to system operation. The origin-node service is dependent on the docker daemon and other dependent services. In the background, the origin-node service automatically starts when the dependent services are up and running.
Workaround:
You can verify the status of the service using the following procedure:
  1. Wait 5-to-8 minutes after you see the ssh/login banner.
  2. Run the command in BASH as root:
systemctl status origin-node.service
920317
Hot plug nuisance log error
Symptoms:
PWR-0366-XX 3000W AC power supply used in VELOS CX410 series chassis reports a 'PSU <n> other communication fault event' in the log when the power supply is hot plugged (Hot plug: disconnecting/applying power to a PSU connection).
Conditions:
This fault indicates that there is a problem with the communication between the primary and secondary PSU DSP devices inside the PSU. This usually happens when the PSU is connected to 12V bus and the AC power cord has been removed. In this situation, the secondary-side DSP is powered from the 12V bus through a peer supply, while the primary-side is not powered because AC is removed.
Impact:
Eventually, the lack of communication triggers a STATUS_CML.COMM_FAULT and records the message in the log. This is a latching fault that can turn-off 12Vout, meaning that, in PMBus, this fault remains asserted even if internally the fault is already removed.
Workaround:
There is no fix for this issue as the power supply functions as designed.
930053
Issuing 'bigstart stop' makes tenant unreachable
Symptoms:
When you issue a 'bigstart stop' command in a tenant running on the VELOS platform, the management port becomes unreachable.
Conditions:
-- Log into the tenant using an ssh connection to the management IP address.
-- Issue the command:
bigstart stop
Impact:
Cannot ssh or ping the tenant management IP address.
Workaround:
Assign per-blade management IPs to each blade within the tenant. The system should remain accessible via the per-blade management IP addresses.
930097
Output for system diagnostics qkview command is not consistent
Symptoms:
When you run the qkview command with the capture, cancel, list, delete, and status subcommands, they produce readable text output. The list and status commands, while readable, produce output that is in JSON format.
Conditions:
-- Run qkview command with subcommands.
Impact:
Output for qkview command is not consistent.
Workaround:
None needed. This is a cosmetic issue.
931753
Tenant management MAC addresses are not from the chassis-wide management pool
Symptoms:
The tenant management MAC addresses do not originate from the chassis-wide management pool. They are software-generated MAC addresses. Though unlikely, this randomly allocated MAC address might collide with an existing MAC address in the tenant management network. This can result in unexpected and erratic network behavior for the tenant and for the external entity that has the same MAC address.
Conditions:
-- Start up a tenant.
-- The system assigns a random management port.
-- The random management port has a MAC address that already exists in the network.
Impact:
A tenant or external entity with the same MAC as the tenant could experience intermittent network issues on the management network, including tenant startup failure.
Workaround:
To have the system generate a new MAC address: toggle the tenant's running state to Provisioned and back to Deployed.
Note:
If the new MAC address also conflicts with an existing MAC address, you must perform these steps again.
932945
STP references to stale interfaces remain when the port group changes
Symptoms:
When you change an existing port group, e.g., from one 100G to 4 25G, STP still reports the old interfaces when you issue 'show stp' from the CLI. Additionally, the new interface does not display in the CLI.
Conditions:
This occurs when making changes to the port group mode, e.g., from one 100G to 4 25G mode.
Impact:
-- The old interfaces still display when running 'show stp' from the CLI.
-- The new interface does not display when running 'show stp' from the CLI.
-- You must manually remove the old interfaces and add the new interface via the CLI.
Workaround:
You must manually remove the old interfaces and add the new interface using the CLI.
939893
CLI does not include firmware version information for sirr or ssd
Symptoms:
The show components component information does not include the firmware version information for the sirr or ssd.
Conditions:
Running the show components command.
Impact:
The show components command does not report the firmware version information for the sirr or ssd data fields.
Workaround:
None
946473
Incorrect interface status returned when System Controller is removed or ceases to function
Symptoms:
The 'show interfaces interface state operstatus' reports 'UP' for interfaces on System Controller when it is permanently down (i.e., powered off or removed).
Conditions:
-- Running the command: 'show interfaces interface state operstatus'.
-- A System Controller is removed or ceases to function.
Impact:
Incorrect status is returned. This occurs because the interfaces operstatus cannot be updated by the down or missing System Controller.
Workaround:
None
950109
Interface 'in-discards' counter not reset
Symptoms:
If you issue a reset counters command, the in-discards counter is not reset to 0.
Conditions:
Issue 'reset counters interfaces <interface>' or 'reset counters all' commands.
Impact:
Counter is not reset to 0.
Workaround:
None
950477
USB device presence causes errors in the blade log
Symptoms:
When a USB device is present in the blade, the velos.log contains a large number of errors from platform-hal related to the USB device and attempts to detect it.
Conditions:
USB device is present in the blade.
Impact:
Numerous unnecessary messages appear in the log.
Workaround:
These messages are benign, and you can safely ignore them.
950793
BAR 7: failed to assign
Symptoms:
During startup, the VELOS system logs a message:
BAR 7: failed to assign.
Conditions:
This occurs when Intel X553 Ethernet is initialized during system startup of a VELOS blade.
Impact:
The messages is benign and you can safely ignore it.
Workaround:
None
950797
ERST and VDO messages during boot
Symptoms:
After system startup, dmesg shows the following messages:
[ 1.306207] ERST: Error Record Serialization Table (ERST) support is initialized.
[ 18.503404] uds: kvdo0:dedupeQ: verifyBufferedData got unexpected data: UDS Error: Corrupt saved component (1030)
Conditions:
Viewing messages after system startup.
Impact:
ERST is not an error. It means ERST is initialized and although 'E' stands for 'error', the log message is not an error message. The kvdo0:dedupeQ message occurs when the VDO volume is initialized. Since the volume has only been initialized, there's nothing to corrupt. Both messages can be ignored.
Workaround:
These are not error messages, and you can safely ignore them.
950837
Command 'show system blade-power' does not show current blade power state
Symptoms:
The CLI command 'show system blade-power' displays the power requested and allocated to a blade. It does not show the power currently being drawn by the blade.
Conditions:
Blade is powered off via AOM commands.
Impact:
The 'show system blade-power' command output does not change, so it is not a suitable method to determine the power status of blades in the system. There is no impact to the running system itself.
Workaround:
Use AOM to check the blade power state if it is not possible to check blade indications visually.
  1. Enter AOM.
  2. Capture blade console.
  3. Select Display Blade Information.
951405
Disabling appliance mode for a tenant leaves root login and shell access disabled
Symptoms:
When appliance mode is enabled, access to the Advanced shell (bash) is removed, and the system root user cannot log in to the device by any means, including the serial console. When appliance mode is then disabled, Advanced shell access and root login are still disabled
Conditions:
-- Enable appliance mode for a tenant.
-- Disable appliance mode for a tenant.
Impact:
Cannot access the Advanced shell or log in as root user when appliance mode is disabled. This is intended functionality.
Workaround:
Log in via tmsh:
tmsh modify sys db systemauth.disablerootlogin value false tmsh
modify sys db systemauth.disablebash value false
951801
CPU and memory utilization statistics might be unavailable on the CLI
Symptoms:
CPU and memory utilization data is blank after bootup for both system controllers when viewed on the CLI, under the following:
  • show components component * cpu state cpu-utilization
  • show components component * state memory
Conditions:
This may happen intermittently if the internal subnet is set to a non-default value.
Impact:
You cannot reliably view CPU and memory utilization through the CLI.
Workaround:
None
954785
CLI component data is not updated to reflect removal of peer system controller
Symptoms:
If the standby system controller is removed, the CLI command 'show components component' information is not updated to reflect its removal.
Conditions:
-- Standby system controller is removed.
-- Running the CLI command 'show components component'.
Impact:
No operational impact other than the data is stale. If another controller is installed, the data is updated to reflect the new controller.
Workaround:
To remove the stale data, you must reboot the remaining system controller or replace the removed standby controller.
956909
Status led may be left off after LCD test
Symptoms:
Status LED may be left in the off state after an LCD test.
Conditions:
Issue occurs after the LCD test is executed.
Impact:
Status LED may not reflect actual state of the system after an LCD test.
Workaround:
Power-cycling the chassis resolves the Status LED state.
957093
Switch-related events with Notice severity found in confd event log during blade reboot
Symptoms:
Several switch-related events sometimes occur when a blade is rebooted. These events are generated if the switch port to which the blade is connected reports an FEC Uncorrected Error, and posts error messages similar to the following:
-- NOTICE 'Switch Port in fault state'.
The errors usually clear soon after the blade boots up.
Conditions:
This occurs upon system startup.
Impact:
The system generates a few unwanted events. If the blade boots successfully and networking is functioning normally, you can safely ignore the 'Switch Port in fault state' events.
Workaround:
None
957129
Qkview collection running on peer does not cancel when main qkview is canceled.
Symptoms:
Qkview collection is distributed, and there is a main process for collecting qkview information from peer devices. The main qkview process (running on the active system controller) or the partition manager, spawns processes to collect from its peers. Peers are not aware of whether the main qkview operation has been canceled.
Conditions:
A qkview is canceled, and then immediately restarted.
Impact:
Partial qkview collection. When a qkview is canceled on the main collection system, the peers are not aware of this, and continue to collect. The peer qkviews may not be collected if the peers are still processing the last qkview request.
Workaround:
Wait 5 minutes after canceling, and then run qkview again.
960893
Tenant deployment fails if tenant name exceeds 49 characters
Symptoms:
If an admin configures a tenant with a name that is longer than 49 characters, tenant deployment fails.
Conditions:
Partition created and enabled on VELOS hardware for admin to login and create a tenant configuration.
Impact:
Configured tenant fails to schedule on the VELOS cluster due to Red Hat OpenShift name length restrictions, i.e., if the tenant name has more than 49 characters, the server rejects the deployment request
Workaround:
Delete the existing tenant and create a new tenant deployment with a name with 49 or fewer characters.
Note
: The system might not prevent you from using more characters, but the recommendation is 49 or fewer.
963941
The authentication method TACACS_ALL is not supported
Symptoms:
The CLI includes the TACACS_ALL authentication option, but this option has no functionality.
Conditions:
This is encountered while configuring authentication using the following command: system aaa authentication config authentication-method
Impact:
TACACS_ALL is presented, but this option does nothing.
Workaround:
Do not use the TACACS_ALL option.
965353
The 'show image' report can have staggered output
Symptoms:
The 'show image' report can conflate subtable output into a single, long set of columns. In some instances, the report begins to stagger row output. Although the information presented is accurate, the format is suboptimal.
Conditions:
Very wide screen widths cause table conflation to take place for the 'show image' report.
Impact:
Some rows (right-hand side of report) wrap around to the next line, making the report more difficult to interpret.
Workaround:
Adjust the screen width before running 'show image', as in:
syscon-1-active# screen-width 60
syscon-1-active# show image
968529
Partition number interfaces are not listed under Network Settings > Port Groups, Interfaces, or LAGs
Symptoms:
No interfaces are listed in the partition management screen under Network Settings > Port Groups, Interfaces, or LAGs.
Conditions:
Conditions under which this occurs are not entirely known. It has been seen after multiple reset-to-defaults commands are issued.
Impact:
System does not function properly.
Workaround:
Issue a single reset-to-defaults command at a time. Should this condition occur, reboot the entire chassis (both controllers) and the interfaces should repopulate as expected.
968881
Creating a partition using the CLI, 'commit check' fails
Symptoms:
When creating a partition using the CLI, and trying to validate the changes with 'commit check', a validation error occurs: partitions 'partition part1 uuid' is not configured.
Conditions:
-- Create a partition using the CLI.
-- Attempt to validate the changes using 'commit check'.
Impact:
The 'commit check' operation rejects this config change. This error is misleading, indicating that you need to specify a uuid value.
Note
: Not only is uuid irrelevant, it is not possible for you to specify it.
Workaround:
None
973209
Previously saved system database filename is not tab-expandable
Symptoms:
When restoring a previously saved system database, the filename is not tab-expandable. There is no way to get a list of the existing system database backup filenames, other than by using CLI filesystem operations.
Conditions:
-- Run 'system database config-backup name' to restore a previously saved system database using the CLI.
-- Attempt to tab-expand the filename portion of the command.
Impact:
You must exit to the bash shell, or use the file operations to find the backup filename and try the operation again.
Workaround:
To determine the previously saved filenames:
-- For system controller, use:
file list path /var/confd/configs/
-- For partitions, use:
file list path /var/F5/partition/configs/
973217
Qkview generation mishandles filename with space in it
Symptoms:
If the qkview filename contains a space, the system uses only first word for the qkview filename.
Conditions:
Using filenames with spaces in them while generating a qkview.
Impact:
Only the first word is used in the generated qkview filename.
Workaround:
Do not use spaces in qkview filenames.
973449
System date/time not displayed in GUI, cannot be set
Symptoms:
The system does not display the current date/time and timezone in the GUI, which can make it difficult to review alerts or logs without knowing/remembering how the system is configured. The system does not provide a mechanism to update the system clock directly, without NTP.
Conditions:
Attempting to view or set system time and date via the GUI.
Impact:
You cannot view or set system time and date through the GUI.
Workaround:
None
973469
The ed25519 certificate and key are not accepted.
Symptoms:
The GUI stops working without any warning or error if an ed25519 crt/key is imported.
Conditions:
Import an ed25519 crt/key.
Impact:
GUI stops working. In the system controller log you see errors:
-- controller-1 /usr/bin/authd[7]: priority="Err" version=1.0 msgid=0x3901000000000026 msg="OpenSSL PEM_read_bio_PrivateKey failed read key" file="server.key".
-- controller-1 /usr/bin/authd[7]: priority="Err" version=1.0 msgid=0x3901000000000022 msg="OpenSSL X509_PUBKEY_get failed to get key."
Workaround:
Do not use ed25519 crts/keys.
979337
Two different partitions can be assigned the same management IP address
Symptoms:
It is possible to assign the same management IP address to multiple partitions.
Conditions:
This is encountered when creating new partitions using the CLI. You can duplicate the management IP address without getting an error.
Impact:
Creating a duplicate management IP address can cause management traffic disruption.
Workaround:
Reconfigure the affected partitions with unique IP addresses.
980129
CLI shows prefix length of 32 after removing IPv4 address
Symptoms:
When the CLI is used to clear the configured IPv4 address, the system reports the prefix length as 32 bits
Conditions:
-- Clearing the configured IPv4 address.
-- Viewing the prefix information the system reports.
Impact:
CLI shows prefix length of 32. There is no functional impact. When an IPv4 address and prefix is set again, the proper prefix length is reported.
Workaround:
None
980701
Incorrect standby system controller state reported with show components component
Symptoms:
When the standby system controller is removed, the CLI data is not updated to reflect its removal. The empty state field is one of several bits of data that is not correct.
Conditions:
-- After removal of standby system controller.
-- Viewing state information in the CLI.
Impact:
No operational impact; just stale/incorrect CLI data about the state of the removed system controller.
Workaround:
You can correct the data using either of the following:
-- Reboot the remaining system controller.
-- Insert a system controller to replace the standby controller that was removed.
981081
Qkview file is not created if a failover happens during collection
Symptoms:
Qkviews are started and collected on the active controller/partition. If a failover happens while a qkview is in progress, that qkview operation is aborted, and the file deleted.
Conditions:
1. Start a qkview on the active device.
2. Failover the active to standby.
Impact:
The qkview collection stops and no file is created.
Workaround:
Do not initiate a failover from active to standby while qkview is in progress.
981605
Qkview truncates lines of top command at 80 characters.
Symptoms:
The top command defaults to 80 characters, if run outside of a console, as it is in qkview. When top is executed in this fashion, the -w parameter must be used, in order to specify output width.
Conditions:
Run qkview.
Impact:
Output of top command is truncated at 80 characters. Some contents of the top command may be missing in qkview files.
Workaround:
Run top separately from qkview.
982309
IPv6 configuration options are present in CLI but are not actually supported
Symptoms:
The CLI presents configuration options for IPv6, but the IPv6 functionality is not supported in this release and does not function properly.
Conditions:
-- Viewing the CLI configuration options.
-- Attempt to configure the IPv6 options.
Impact:
IPv6 configuration does not work.
Workaround:
None
984073
Slow system controller operations related to images
Symptoms:
A number of system controller operations related to images suffer from an approximately 5-second delay. This includes CLI commands such as 'show image partition' and 'show image controller', but there is also a delay when using tab-completion to view suggested completions for such commands. The delay appears to be mostly constant, independent of the number of partitions in the system. The delay is always present for these commands.
Conditions:
Using CLI commands related to images.
Impact:
In addition to the 5-second delays experienced directly on the CLI, there is likely similar impact to related GUI functionality, such as the partition management page. These delays do not appear to negatively impact any functionality.
Workaround:
None
984081
Delete key functions like Backspace in F5OS CLI
Symptoms:
Inside the F5OS CLI, the Delete key behaves in the same way as the backspace key. Instead of deleting the next character (the character to the right of the cursor), pressing Delete removes the previous character (the character to the left of the cursor).
Conditions:
Using the F5OS CLI.
Impact:
'Delete' key does not function in expected fashion.
Workaround:
Use the arrow keys to change the cursor location and then use backspace.
984089
Tcpdump captures at the partition level may show packets in the wrong time order
Symptoms:
Tcpdump may show the packets in an out-of-order fashion if it is run from a partition that spans multiple blades. The order refers to the timeline of these packets appearing on the network links outside the system, e.g., a TCP SYN may come from the client to the system, and the system may have responded with a SYN-ACK to the outside client. The capture may show the SYN-ACK packet first and then the SYN.
Other than inferring from knowledge of the protocol what these packets represent, there is no real way to mitigate in the multiple-port aggregation scenario.
Note
: A tcpdump run from inside a BIG-IP tenant shows the correct order.
Conditions:
-- This may be encountered where there is an LACP-aggregated link that spans two ports on two different blades.
-- It has also been seen less frequently as out-of-order between ingress (outside-to-host) and egress (host-to-outside) packets.
Impact:
Tcpdump captures show the order of the packets differently from when they really happened, leading to possible misinterpretation of events.
Workaround:
None
984721
CLI commands for DNS and NTP could be simplified
Symptoms:
The CLI commands to configure DNS and NTP require specifying addresses twice. For example, specifying a DNS server:
config system dns servers server 10.10.10.10 config address 10.10.10.10 commit
Conditions:
Configuring a DNS or NTP server using the CLI commands.
Impact:
There is no operational impact; however, it is preferable to enter the IP address only once.
Workaround:
None. You have to specify the IP address twice.
985009
PSU data missing in show components component
Symptoms:
After a system controller failover, the PSU information may not be populated in the command: show components component.
Conditions:
Active system controller fails over to the standby.
Impact:
PSU data is not listed. There is no operational impact to the system.
Workaround:
A total system reboot is the only option for listing the PSU data in the 'show components component' output.
985269
Error when creating users using the webUI
Symptoms:
When using the webUI to create a new user on the System Controller, you click the Save and Close button and the user is created but an error is displayed:
Server Error(s)
Something went wrong. Check the web browser console for more details or contact technical support for assistance.
Conditions:
Using the webUI to create a new user account.
Impact:
The user is created but an error is displayed.
Workaround:
None
986061
Partition config-backup silently overwrites a previous config backup
Symptoms:
The partition 'system database config-backup' command overwrites an existing backup file.
Conditions:
Running the partition 'system database config-backup' command.
Impact:
If a config backup exists, the operation silently overwrites it.
Workaround:
Specify a unique filename for each backup operation: system database config-backup name unique-filename.
986769
Archive containing matched F5OS ISO images cannot be imported directly
Symptoms:
The top-level software for F5OS comprises two ISO images: one for partition/blades, and one for the system controller. These must both be installed, separately.
You have the option of downloading a .tar file containing both .iso files. However, the .tar archive is not itself directly importable on the running system, and the download stalls.
Conditions:
-- Download the F5OS software in a bundled .tar archive.
-- Attempt to import the bundle for use on the system.
Impact:
Import operation does not complete. You must perform manual steps to import F5OS the .tar software file.
Workaround:
-- There are two .iso files that you must download for F5OS software: one for the system controller and one for the partition. These must both be installed, separately. You can download them separately and install them individually.
-- You can also download the .tar file, if you prefer to download both .iso files simultaneously. That way, you can untar the download in a location on an HTTPS server to serve the images to the chassis being rolled out. Once copied over, unpack the archive and import each ISO individually, by copying them to the import directory (/var/import/staging) on the active system controller.
987509
CVE-2020-1971: OpenSSL vulnerability
987565
Importing F5OS platform software can take a very long time
Symptoms:
In many cases, software imports (such as chassis partition or system controller ISO imports) can take up to 30 minutes to complete and synchronize across both system controllers.
Conditions:
This is encountered when importing F5OS platform software for VELOS.
Impact:
It may take a long time for the import to complete and synchronize.
Workaround:
Wait at least 30 minutes for imports to synchronize before assuming the import has failed and trying to fix it.
987581
CVE-2020-25643: Linux Kernel Vulnerability
Symptoms:
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
F5OS status:
Not vulnerable.
988549
CVE-2020-29573: glibc vulnerability
988669
Interface config tpid leaf is exposed but it is not supported.
Symptoms:
Interface config tpid leaf is exposed but it is not supported.
Conditions:
-- In CLI config mode, the system presents tpid as a possible config option.
-- In CLI show mode, tpid is shown as oper data.
Impact:
Interface config tpid leaf is exposed but it is not supported.
Workaround:
Ignore the tpid from interface/config or interface/state.
989181
CVE-2020-14385: Linux kernel vulnerability
989189
CVE-2019-18282: Linux kernel vulnerability
989425
Multiple dnsmasq vulnerabilities
Symptoms:
Multiple dnsmasq vulnerabilities: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686, CVE-2020-25687 A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies so that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Workaround:
N/A
989461
CVE-2020-29573: glibc vulnerability
989525
Logging into a partition as root is denied with misleading message 'password expired'
Symptoms:
When logging in to a partition as the 'root' user, login is denied and displays the message 'password expired'. Root is not allowed to log into partitions, so the error message is misleading.
Impact:
User may not understand why root access is denied.
990161
Removing the active System Controller occasionally leaves the OpenShift cluster offline
Symptoms:
The OpenShift cluster will appear offline to the user.
Conditions:
Occurs occasionally when the active system controller is physically removed.
Impact:
No access to the OpenShift cluster. The OpenShift cluster appears offline.
Workaround:
To have the cluster come back online, re-insert the extracted system controller.
990897
Tenant operational state has incorrect data when it has no nodes
Symptoms:
When the admin removes nodes from tenant configuration and upgrades the system controller software, the tenant status comes up with an error state.
Conditions:
Admin removes nodes from the tenant configuration using either of the following commands:
no tenants tenant <name> config nodes
tenants tenant <name> config nodes [ ]
Impact:
This has no effect on system functionality. The system is simply reporting an incorrect state of the tenant.
Workaround:
To process any traffic through the tenant, you must have a minimum of one node in the tenant config, for example:
show running-config tenants tenant <name> config nodes
tenants tenant example1
config nodes [ 1 ]
!
991029
Primary-Key-Migration set response message references incorrect command
Symptoms:
After setting the primary key, the system reports the following message:
-- Response Info: Key migration is initiated. Use 'show system primary-key state status' to get status.
This is the wrong command.
Conditions:
-- This is encountered when running the following command:
system aaa primary key set
Impact:
The prompt for the set command is misleading.
Workaround:
Use the command:
show system aaa primary-key state status
991061
Admin cannot edit the tenant config in Deployed state from GUI if the tenants are created via CLI
Symptoms:
Tenant validations are not working when a tenant is created using the CLI and subsequently edited in the GUI.
Conditions:
Admin creates the tenant via CLI and subsequently edits the following tenant config when the running-state is set to Deployed:
-- Scale-up/Scale-down the tenant.
-- Add/Remove VLAN.
Impact:
Admin cannot scale up/scale down the cluster using the GUI if the tenant is initially deployed via CLI.
Workaround:
Use the CLI to scale-up/scale-down and add/remove the VLAN to the tenant.
991309
'TPM Randomization failed' message in log
Symptoms:
When the BIOS on a blade is freshly updated and the blade is booted, there may be a 'TPM Randomization failed' message observed in the log output. This message occurs only once (if at all) and is then followed by a successful boot of the system. This is caused by the TPM randomization step of the boot not being completed. The next boot of the system, initiated by the BIOS when this condition is encountered, allows the TPM randomization to complete. For security purposes, the system does not boot to the OS until TPM randomization has successfully completed.
Conditions:
This particular instance of this message may occur after a fresh BIOS update to the system. If the initial boot after a BIOS install is interrupted, the subsequent boot may display this message in the log. The BIOS then causes the blade to reboot, allowing the TPM randomization step to complete.
Impact:
There is no impact to the functionality of the system. The message is for informational purposes only in this situation. If the TPM randomization step of the BIOS execution is not able to complete successfully, the BIOS causes the blade to reboot until the TPM randomization is successful.
Note
: If the system continually fails to boot due to this issue, you may have a hardware issue that requires F5 response to correct.
Workaround:
Allow the blade to continue to boot. Once the BIOS has caused the blade to reboot, the condition clears itself and the message no longer appears as part of the boot process.
992381
Tenant Management MAC address is not correctly displayed in tmsh or iControl interfaces
Symptoms:
The F5OS partition CLI correctly displays the tenant management MAC address that matches what the tenant reports via 'ifconfig mgmt'. However, 'tmsh show sys mac-address' shows a different value. (vCMP guests also exhibit this behavior.)
Conditions:
This is encountered on F5OS tenants.
Impact:
No functional impact known; just reports incorrect data.
Workaround:
If the tenant MAC address is required, use 'ifconfig mgmt' inside the tenant, or use the value in the partition CLI.
992477
Tenant does not start up with the right config after frequent running-state changes
Symptoms:
If you create a tenant and set the running-state to deployed, (do not wait for full startup), immediately change the running-state to provisioned (do not wait for state change), immediately change tenant config such as vCPU/memory/VLANs/etc, and then immediately change back to deployed, the tenant starts up fine but may not come up with the right resources/config.
Conditions:
This occurs when the tenant running-state changes with no wait time in between state changes.
Impact:
The tenant starts up with inaccurate resources (e.g., vCPU/memory/VLANs/mgmt-ip).
Workaround:
Wait a minimum of 30 seconds to 1 minute between when the tenant running-state transitions from one state to another. One way to ensure the clean transition is to verify the following state if the tenant is reached the desired state.
If performing deployments from the CLI:
show tenants tenant <tenant-name> state status
For example:
-- If the tenant running-state is 'deployed':
default-1#
show tenants tenant defaultbip-1 state running-state
state running-state deployed
Verify the transition state if it reached the desired state: 'running' (if running-state is deployed).
default-1#
show tenants tenant defaultbip-1 state status
state status Running
-- If performing deployments from the GUI, verify the tenant status next to the state under Tenant Management > Tenant Deployments.
993325
System controller does not have remote method to power on after being remotely powered off
Symptoms:
If the system controller is powered off from the Linux bash shell using 'shutdown -P' or an equivalent command, there is no method available in Always-On Management (AOM) menu, or any other method, to remotely power back on the system controller.
Once the system controller is powered off, it can be powered on only by either reseating the system controller or performing a full chassis power cycle.
Conditions:
The system controller is powered off using a bash command.
Impact:
You are unable to remotely power on a system controller after it has been powered off.
Workaround:
Reseat the controller or power cycle the chassis.
993985
Image import is not re-attempted if controller reboots while importing
Symptoms:
If a system controller reboots in the middle of importing platform software, the import does not automatically restart on the next boot. Additionally, it is not possible to overwrite it via a new file transfer to try again.
Conditions:
-- Valid F5OS software has begun importing on a system controller, but the import is not complete yet.
-- A reboot is issued by either the admin user or the software.
Impact:
The software is not imported.
Workaround:
Follow this procedure:
1. Download the software again, but using a different destination file name.
2. Try the import operation again.
994429
Traffic loss on previously active system controller
Symptoms:
Traffic on the previously active system controller is lost, so effectively half of the traffic is lost.
Conditions:
Occurs if the active system controller is not functioning properly. Here are some examples:
-- The system controller is physically non-functional (no electrical activity, etc.).
-- System software results in system controller failures for a long time.
Impact:
Traffic on the previously active system controller is lost.
Workaround:
Reboot the newly active system controller.
995061
CVE-2019-17006: NSS Vulnerability
Symptoms:
A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.
Workaround:
N/A
995145
CVE-2020-12403: NSS Vulnerability
Symptoms:
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability
Workaround:
N/A
995297
CVE-2021-3326: glibc Vulnerability
995305
CVE-2020-8625: BIND Vulnerability
995597
CVE-2018-15688: systemd Vulnerability
Symptoms:
It was discovered that systemd-network does not correctly keep track of a buffer size when constructing DHCPv6 packets. This flaw may lead to an integer underflow that can be used to produce a heap-based buffer overflow. A malicious host on the same network segment as the victim's one may advertise itself as a DHCPv6 server and exploit this flaw to cause a Denial of Service or potentially gain code execution on the victim's machine.
Workaround:
N/A
995613
CVE-2019-10126: Linux kernel vulnerability
995633
CVE-2019-10160: Python vulnerability
Symptoms:
A security regression of CVE-2019-9636 was discovered in python, since commit d537ab0ff9767ef024f26246899728f0116b1ec3, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
Workaround:
N/A
995645
CVE-2019-9636: python vulnerability
995649
CVE-2018-16402: libelf vulnerability
Symptoms:
libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
Workaround:
N/A
995657
CVE-2019-17133: Linux kernel vulnerability
995745
CVE-2018-11236: glibc vulnerability
995769
CVE-2018-20060: python vulnerability
Symptoms:
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
Workaround:
N/A
995777
CVE-2016-4448: libxml2 vulnerability
995781
CVE-2019-3861: libssh2 vulnerability
Symptoms:
An out of bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a denial of service or read data in the client memory.
Workaround:
N/A
995785
CVE-2019-11068: libxlst vulnerability
Symptoms:
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
Workaround:
N/A
995789
CVE-2019-12450: glib vulnerability
Symptoms:
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
Workaround:
N/A
995793
CVE-2019-5953: wget vulnerability
995801
CVE-2018-18074: python vulnerability
Symptoms:
A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials.
Workaround:
N/A
997085
CVE-2020-8625: BIND Vulnerability
997237
Changing chassis-id in system network config causes the cluster to not install correctly
Symptoms:
If the chassis-id is changed from the default of 1 in the 'system network' configuration on the system controller, the cluster does not reinstall correctly once the change takes effect.
Conditions:
Chassis-id is changed from default of 1 to any other value.
Impact:
Cluster does not re-install correctly, which means tenants cannot be launched on the system.
Workaround:
None
998301
CVE-2021-23839: OpenSSL vulnerability
998305
CVE-2021-23840: OpenSSL vulnerability
998309
CVE-2021-23841: OpenSSL vulnerability
998421
Blades need an extra manual reboot after network prefix change
Symptoms:
When changing the chassis internal network prefix range (RFC6598 to/from RFC1918), blades require an additional manual reboot to fully implement the change in prefix.
Conditions:
Chassis internal network prefix is changed.
Impact:
Configuration of a new network prefix requires additional manual step.
Workaround:
Workaround:
Manually reboot the affected blades an additional time after changing the chassis network prefix.
999229
Management session may be unresponsive after rebooting the standby System Controller
Symptoms:
When the standby system controller is rebooted, the user's management session may freeze for 10-15 seconds.
Conditions:
The standby system controller is rebooted
Impact:
The management session is frozen briefly, then resumes normal operation.
Workaround:
None
999345
CVE-2020-8284: libcurl vulnerability
999357
CVE-2020-8285: libcurl vulnerability
999365
CVE-2020-8286: libcurl vulnerability
999377
CVE-2020-8286: libcurl vulnerability
999833-1
Online blade missing from Active Blades bitmap
Symptoms:
After powering on or rebooting one or more blades in a partition, blades can fail to establish data plane connectivity between each other across the backplane, resulting in complete loss of traffic in between blades.
Symptoms may include an inability for multi-blade tenants to cluster, or traffic received by one blade being unable to route that traffic to another blade, among other possibilities.
You can identify the problem more specifically by inspecting the tmstat 'vqf_cfg' table in the partition_fpga container. On each blade perform the following:
docker exec -it partition_fpga tmctl -d blade -w 120 vqf_cfg
If the 'active_blades' column does not have the same value for all assigned and enabled blades within a partition, and are otherwise expected to be running with good states, then this issue has likely been encountered.
Conditions:
-- A blade is booted for the first time, or rebooted.
Impact:
Loss of data plane traffic in between blades within a partition.
Workaround:
Attempt to reboot the blade until the condition clears.
1000449
CVE-2020-12049: dbus Vulnerability
Symptoms:
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
Workaround:
N/A
1000453
CVE-2019-25013: glibc vulnerability
1009189
SwitchD may fail to start due to insufficient memory
Symptoms:
The system controller is unable to communicate with one or more of the running blades. The 'show cluster' command indicates one or more blades are Not Ready even though the blade or blades are fully booted. The other system controller may show similar misreporting of blades, but on different blades.
During switchd startup, an issue occurs and switchd will not provide the required switch configuration, resulting in a management port and internal chassis network outage.
Conditions:
-- The problem can manifest any time SwitchD starts/restarts. It is most likely to occur during installation or live update of the system controller software.
Impact:
The problem persists until the system controller on which the condition occurs is rebooted.
Workaround:
None
1009497
Orchestration_manager daemon can core on shutdown
Symptoms:
The orchestration_manager daemon may intermittently core on reboot of the system controller. This will leave a core file on the system controller.
Conditions:
-- Reboot of the active or standby system controller.
Impact:
Creates a core file. Does not affect operation of the system.
N/A
1012373
CVE-2021-20305 Nettle vulnerability
Symptoms:
A flaw was found in Nettle, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results.
Impact:
This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threats to this vulnerability are to confidentiality, integrity, and system availability.
Workaround:
F5OS should not be affected so no mitigation is needed. Nettle is installed in the host-os but there is no real user of that. Some OpenShift containers install the package but they are not exposed to the outside.
1013977
Timestamps not consistent across chassis
Symptoms:
The blade logs use PDT (Seattle) timezone whereas other logs are in the customers' local timezone (that is, on a properly configured BIG-IP system) and some controller logs are in UTC.
Conditions:
Examine various logs across the chassis and notice that they use inconsistent timezones.
Impact:
Consistent timezones across chassis logs would facilitate troubleshooting.
Workaround:
None
1014153
Timeout/failure on blade/cc pxeboot
Symptoms:
When attempting to pxeboot blades or chassis controllers, it will fail with a timeout.
Conditions:
There are two known possible explanations for this. One is that the steps to configure pxeboot have not been performed. The other is that the services provided by the image-server container have stopped working properly.
Impact:
pxeboot will fail.
Workaround:
To configure for pxeboot, be sure that a chassis partition iso has been imported, a chassis partition has been configured and enabled, and the slots to boot are assigned to it.
If those steps were performed properly, then it is possible the image-server services are no longer properly functioning. Restart vcc-image-server container or reboot the system controller.
1019165
CVE-2019-20907 Python Vulnerability
N/A
1023561-1
Restoring from a partition backup restores out of date tables
Symptoms:
When running "system database config-restore" on the chassis partition CLI, the fdb and vlan-listeners tables are erroneously restored. These tables can contain stale data that interferes with datapath configuration.
Conditions:
This issue occurs when running "system database config-restore" on the partition CLI.
Impact:
The datapath to tenants may not work until the tenants are re-deployed.
Workaround:
Delete the fdb and vlan-listeners tables immediately after restoring the configuration.
Follow this procedure:
1. system database reset-to-default proceed yes
2. system database config-restore name <backup_filename>
3. no fdb ; no vlan-listeners ; commit
1035185
Platform rejects tenant control plane messages
Symptoms:
The Platform layer continuously rejects control plane messages from a Classic BIG-IP tenant. This causes the tenant to be stuck on startup, and never fully start.
Conditions:
This issue can happen if a tenant is deleted and then rapidly recreated with the same name in a chassis partition.
Impact:
The tenant never completes the start up process, and is inaccessible.
Workaround:
In the bash shell, run the following command on the affected blade.
docker restart partition_api_svc_gateway