Applies To:
Show Versions
F5OS-A
- 1.5.4
F5OS-A Release Information
Version: 1.5.4
Build: 37447
Tag: LTS
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Cumulative fixes from F5OS-A v1.5.3 that are included in this release
Cumulative fixes from F5OS-A v1.5.2 that are included in this release
Cumulative fixes from F5OS-A v1.5.1 that are included in this release
Cumulative fixes from F5OS-A v1.5.0 that are included in this release
Known Issues in F5OS-A v1.5.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description |
| 2063565-2 | CVE-2022-23219 | K52308021 | CVE-2022-23219: glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname |
| 2063545-2 | CVE-2022-23218 | K52308021 | CVE-2022-23218: glibc: Stack-based buffer overflow in svcunix_create via long pathnames |
| 2008753-1 | CVE-2025-57780 | K000156771 | Privilege Escalation to Admin via SSH Port Forwarding |
| 2008505-5 | CVE-2025-61955 | K000156771 | F5OS SCP hardening |
| 2000389-3 | CVE-2018-10105 | K000156675 | CVE-2018-10105 - tcpdump: SMB data printing mishandled |
| 1999777-3 | CVE-2018-10103 | K000156675 | CVE-2018-10103 - tcpdump: SMB data printing mishandled |
| 1998521 | CVE-2021-3517 | K03179547 | CVE-2021-3517 libxml2: Out-of-Bounds Read in XML Entity Encoding Functionality |
| 1997929 | CVE-2022-23308 | K32760744 | CVE-2022-23308 libxml2: Use-After-Free in ID and IDREF Attribute Handling |
| 1953653-4 | CVE-2022-27406 | K000141126 | cve-2022-27406: Freetype: Segmentation violation via FT_Request_Size |
| 1780617-2 | CVE-2023-45288 | K000148640 | CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames |
| 1630273-8 | CVE-2023-4207 | K000138693 | CVE-2023-4207 - Centos Security Update for kernel |
| 1630253-9 | CVE-2023-4208 | K000138693 | CVE-2023-4208 - Centos Security Update for kernel |
| 1618989-1 | CVE-2023-45288 | K000148640 | CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames |
| 1598633-6 | CVE-2023-45288 | K000148640 | CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames |
| 1381225-5 | CVE-2023-39325, CVE-2022-41723, CVE-2023-44487 | K000152389 | CVE-2023-39325 - HTTP/2 rapid reset |
| 1381205-4 | CVE-2023-39325, CVE-2022-41723, CVE-2023-44487 | K000152389 | CVE-2023-39325 - HTTP/2 rapid reset |
| 1381177-3 | CVE-2023-39325, CVE-2022-41723 | K000152389 | CVE-2023-39325 - HTTP/2 rapid reset |
| 1298021-3 | CVE-2023-2253 | K000151459, BT1298021 | CVE-2023-2253: DOS attack possible using massive string arrays in golang |
| 1231485-7 | CVE-2020-17541 | K000140960 | CVE-2020-17541-libjpeg-turbo vulnerability |
| 1167501-2 | CVE-2021-2388 CVE-2022-34169 |
K42795243 | java-1.8.0-openjdk: CVEs due to integer truncation and incorrect comparison during range check elimination CVE-2021-2388, CVE-2022-34169 |
| 2078301-1 | CVE-2025-60015 | K000156796, BT2078301 | dagd may crash if a malicious message is sent from the tenant |
| 1495337-2 | CVE-2025-60013 | K000154661 | FIPS Password Initialization Failure with Special Characters |
Functional Change Fixes
None
F5OS-A Fixes
| ID Number | Severity | Links to More Info | Description |
| 2130349 | 1-Blocking | Older BIG-IP image import fails with signature verification | |
| 2050869 | 3-Major | CVE-2022-41721 x/net/http2/h2c: request smuggling | |
| 2050865 | 3-Major | CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache | |
| 2050861 | 3-Major | CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment | |
| 2050853 | 3-Major | CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag | |
| 2050845 | 3-Major | CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags | |
| 2050841 | 3-Major | CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension | |
| 2050833 | 3-Major | CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS | |
| 2050825 | 3-Major | CVE-2022-41721 x/net/http2/h2c: request smuggling | |
| 2050801-2 | 3-Major | CVE-2017-16539 docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames | |
| 2050793-2 | 3-Major | CVE-2024-36623 moby: Race Condition in Moby's streamformatter Package | |
| 2050701-1 | 3-Major | CVE-2025-58754 axios: Axios DoS via lack of data size check | |
| 1998753 | 3-Major | CVE-2021-3516 libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c | |
| 1998541 | 3-Major | CVE-2021-3518 libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c | |
| 1998417 | 3-Major | CVE-2022-29824 libxml2: Integer Overflow in Buffer Handling Functions Leading to Out-of-Bounds Writes | |
| 1998265 | 3-Major | CVE-2021-3537 libxml2: NULL Dereference Due to Improper Error Handling in Mixed Content Parsing Ask Explain | |
| 1998233 | 3-Major | CVE-2017-9047 libxml2: Buffer Overflow in xmlSnprintfElementContent | |
| 1997969 | 3-Major | CVE-2017-16931 libxml2: Improper Handling of Parameter-Entity References | |
| 1996657-2 | 3-Major | CVE-2022-2817 vim: heap use-after-free in string_quote() at src/strings.c | |
| 1996609-2 | 3-Major | CVE-2022-3296 vim: out-of-bound write in function ml_append_int | |
| 1996593-2 | 3-Major | CVE-2022-3234 vim: Heap-based Buffer Overflow | |
| 1996585-2 | 3-Major | CVE-2022-2816 vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c | |
| 1996529-2 | 3-Major | CVE-2022-2210 vim: out-of-bound write in function ml_append_int | |
| 1996329-2 | 3-Major | CVE-2022-2580 vim: Out-of-bounds Read in vim | |
| 1996193-2 | 3-Major | CVE-2022-2285 vim: integer overflow in del_typebuf() at getchar.c | |
| 1995929-2 | 3-Major | CVE-2023-0433 vim: reading past the end of a line when formatting text | |
| 1995773-2 | 3-Major | CVE-2022-3256 vim: use-after-free in movemark() at mark.c | |
| 1995661-2 | 3-Major | CVE-2023-0512 vim: divide by zero in adjust_skipcol() at move.ca | |
| 1995613-2 | 3-Major | CVE-2022-2207 vim: heap-based buffer overflow in function ins_bs | |
| 1995465-2 | 3-Major | CVE-2022-2889 vim: use-after-free in find_var_also_in_script() in evalvars.c | |
| 1995445-2 | 3-Major | CVE-2022-2287 vim: out of bounds read in suggest_trie_walk() at spellsuggest.c | |
| 1995353-2 | 3-Major | CVE-2022-2581: vim: Out-of-bounds Read in vim src/regexp.c | |
| 1995349-2 | 3-Major | CVE-2022-2571 vim: Heap-based Buffer Overflow in vim | |
| 1995341-2 | 3-Major | CVE-2022-3352 vim: use after free | |
| 1995337-2 | 3-Major | CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension | |
| 1995157-2 | 3-Major | CVE-2022-2182 vim Heap-based Buffer Overflow | |
| 1995097-2 | 3-Major | CVE-2022-2125 vim Heap-based Buffer Overflow | |
| 1995077-2 | 3-Major | CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass | |
| 1995037-2 | 3-Major | CVE-2022-3705 vim: a use after free in the function qf_update_buffernt | |
| 1994969-2 | 3-Major | CVE-2022-2946 vim-minimal-7.4.629-6.el7.x86_64.rpm: Use After Free in GitHub repository vim/vim prior to 9.0.0246 | |
| 1994953-2 | 3-Major | CVE-2022-2284 vim: out of bounds read in utfc_ptr2len() at mbyte.c | |
| 1994929-2 | 3-Major | CVE-2022-2819 vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c | |
| 1994669-2 | 3-Major | CVE-2023-0051 vim: heap-based buffer overflow in msg_puts_printf() in message.c | |
| 1994637-2 | 3-Major | CVE-2023-3138 - libX11: Out-of-bounds request/event/error ID handling in InitExt.c | |
| 1994593-2 | 3-Major | CVE-2020-14363 - libX11: Integer overflow leading to double-free in locale handling | |
| 1994517-2 | 3-Major | CVE-2022-2126 vim: out of bounds read in suggest_trie_walk() | |
| 1994465-2 | 3-Major | CVE-2022-2862 vim: heap use-after-free in generate_PCALL() at src/vim9instr.c | |
| 1994449-2 | 3-Major | CVE-2023-0054 vim-minimal-7.4.629-6.el7.x86_64.rpm: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145. | |
| 1959845-5 | 3-Major | CVE-2022-48340: glusterfs: heap use-after-free in dht_setxattr_mds_cbk() in dht-common.c | |
| 1857245-2 | 3-Major | CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange | |
| 1857197-1 | 3-Major | CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange | |
| 1857001-2 | 3-Major | CVE-2025-27152: axios vulnerability | |
| 1782497-1 | 3-Major | CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder | |
| 1780721-2 | 3-Major | CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder | |
| 1280953-4 | 3-Major | CVE-2021-33194: DOS attack possible using ParseFragment input in golang | |
| 1207101-6 | 3-Major | CVE-2019-13509 docker: Docker Engine in debug mode may sometimes add secrets to the debug log leading to information disclosure | |
| 1195561-1 | 3-Major | CVE-2022-3705 vim: a use after free in the function qf_update_buffer | |
| 1107361-5 | 3-Major | CVE-2020-15113 etcd: directories created via os.MkdirAll are not checked for permissions | |
| 1348297-4 | 4-Minor | CVE-2020-15113, CVE-2020-15114, CVE-2020-15115 - etcd Vulnerabilities | |
| 1348189-4 | 4-Minor | CVE-2020-13790 libjpeg-turbo: heap-based buffer over-read in get_rgb_row() in rdppm.c |
Cumulative fixes from F5OS-A v1.5.3 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description |
| 1614821-4 | CVE-2024-3596 | K000141008, BT1614821 | CVE-2024-3596 - Blast-RADIUS |
| 1620513-2 | CVE-2024-38477 | K000140784, BT1620513 | CVE-2024-38477 httpd: NULL pointer dereference in mod_proxy |
| 1607745-6 | CVE-2024-38474, CVE-2024-38475, CVE-2024-38476 | K000140618 | Apache HTTPD vulnerabilities CVE-2024-38476, 2024-38474 and CVE-2024-38475 |
| 1577049-4 | CVE-2024-1086 | K000139430, BT1577049 | CVE-2024-1086 - Linux kernel vulnerability |
| 1327689-2 | CVE-2025-36546 | K000140574, BT1327689 | Manually remove root and user keys before entering Appliance Mode |
| 1691557-4 | CVE-2020-8037 | K000149929 | CVE-2020-8037: tcpdump memory leak. |
| 1628557-1 | CVE-2025-47150 | K000149820 | F5OS high memory usage when using snmp |
| 1124953-4 | CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 |
K04808933, BT1124953 | Intel microcode updates: CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166 |
| 1060193-4 | CVE-2019-5188 | K06014092, BT1060193 | e2fsprogs vulnerability: CVE-2019-5188 |
Functional Change Fixes
None
F5OS-A Fixes
| ID Number | Severity | Links to More Info | Description |
| 1614429-2 | 1-Blocking | K000140362, BT1614429 | iHealth upload is failing with error "certificate signed by unknown authority" |
| 1441333-1 | 1-Blocking | BT1441333 | Rasdaemon memory leak |
| 1753033-2 | 2-Critical | BT1753033 | Snmp is not working if mgmt is in 172.17.x.x network in 1.8.0★ |
| 1713073-2 | 2-Critical | K000148566, BT1713073 | F5OS rSeries spontaneous reboot after upgrade★ |
| 1712009 | 2-Critical | BT1712009 | Attempting to perform a configuration restore, after downgrading from v1.8.0, makes the system inoperable★ |
| 1694481-2 | 2-Critical | BT1694481 | K3s token expiry causing tenant unresponsiveness |
| 1644409 | 2-Critical | BT1644409 | RSeries ATSE v72.40.3.00 firmware |
| 1644405 | 2-Critical | BT1644405 | RSeries ATSE v72.4.4.00 firmware |
| 1620077-1 | 2-Critical | BT1620077 | FDB entry port motion not working if new interface is a trunk/LAG |
| 1596625 | 2-Critical | BT1596625 | BE2 GCI interface training failures during runtime results in failure to process networking traffic★ |
| 1596149-4 | 2-Critical | BT1596149 | Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures |
| 1591645-2 | 2-Critical | BT1591645 | EPVA related dma-agent crash |
| 1575417-1 | 2-Critical | BT1575417 | Platform-diag-agent memory leak |
| 1566569 | 2-Critical | BT1566569 | Unable to access rSeries system from 172.17.0.0/16 IP subnet |
| 1497657-4 | 2-Critical | BT1497657 | First SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges |
| 1327137-1 | 2-Critical | K000138753, BT1327137 | Interfaces take longer than expected to come up |
| 1251129-1 | 2-Critical | BT1251129 | Flannel network needs to be in cluster CIDR |
| 1205345-5 | 2-Critical | BT1205345 | RADIUS remote authentication uses internal system IP address as system identifier in requests |
| 1730833-2 | 3-Major | BT1730833 | Tmm may egress broadcast traffic even when VLANs are disabled in F5OS |
| 1709121-4 | 3-Major | BT1709121 | Unable to create a tenant as the Network Manager start-up or failover may result in a looping process |
| 1701145 | 3-Major | BT1701145 | Intermittent redirection to Dashboard when accessing Add/Edit FIPS Partition |
| 1671629-1 | 3-Major | BT1671629 | [rSeries r2000/r4000] After F5OS reboot, tenant interfaces might be in UNINITIALIZED state |
| 1644293-4 | 3-Major | BT1644293 | Interface status alert and SNMP trap is not sent immediately after interface is disabled |
| 1624449-4 | 3-Major | BT1624449 | SNMP polling of coreTotal5minAvg causing timeouts and genErrors |
| 1621861-2 | 3-Major | BT1621861 | F5OS Upgrade on optics-mgr-package installed device may result in mismatched OS and services★ |
| 1615917-5 | 3-Major | BT1615917 | L2_agent crash due to SNMP★ |
| 1587837-4 | 3-Major | BT1587837 | Memory leak in multiple components |
| 1585765-1 | 3-Major | BT1585765 | Error message IDs for appliance-orchestration-manager are incorrect |
| 1579289-1 | 3-Major | BT1579289 | Empty log message when interface changes state |
| 1490753-1 | 3-Major | BT1490753 | A linkUp and linkDown traps are sent when an up interface is disabled, and vice versa |
| 1381109-2 | 3-Major | WS-2022-0322 - d3-color 2.0.0 package | |
| 1306869-1 | 3-Major | CVE-2021-44716 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974 | |
| 1306861-1 | 3-Major | CVE-2022-30633 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974 | |
| 1306773-1 | 3-Major | CVE-2022-27664 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974 | |
| 1306749-1 | 3-Major | CVE-2022-28131 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974 | |
| 1284681-3 | 3-Major | BT1284681 | IPv6 connections made through port 80 fail |
| 1162341-3 | 3-Major | BT1162341 | Front panel interface status is not reported in alarms or events |
| 1702237 | 4-Minor | BT1702237 | Mismatch between api_svc_gateway auth and zmq_info msg_ids and subset codes |
| 1284389-1 | 5-Cosmetic | BT1284389 | Show system health reports unhealthy during bootup |
Cumulative fixes from F5OS-A v1.5.2 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description |
| 1388477-2 | CVE-2025-46265 | K000139503, BT1388477 | Default GID group mapping authorized even when GID mapped to different group ID |
| 1379845-1 | CVE-2023-3341 | K000137582, BT1379845 | CVE-2023-3341:bind: stack exhaustion in control channel code may lead to DoS |
| 1322817-4 | CVE-2023-2828 | K000135312, BT1322817 | BIND vulnerability CVE-2023-2828 |
| 1091853-5 | CVE-2022-23308 | K32760744, BT1091853 | CVE-2022-23308: libxml2 vulnerability |
| 1378313-3 | CVE-2020-22218 | K000138219, BT1378313 | CVE-2020-22218: libssh2: use-of-uninitialized-value in _libssh2_transport_read |
| 1194881-5 | CVE-2022-2795 CVE-2021-25220 |
K78285929 | Bind vulnerabilities: CVE-2021-25220 and CVE-2022-2795 |
Functional Change Fixes
None
F5OS-A Fixes
| ID Number | Severity | Links to More Info | Description |
| 1496837 | 1-Blocking | BT1496837 | User-manager's ConfD socket getting closed. |
| 1360905-3 | 1-Blocking | BT1360905 | Unexpected log messages in /var/log/boot.log post-integrity recovery |
| 1332781-4 | 1-Blocking | BT1332781 | A remote user with the same username as the local F5OS user will be granted the local user's roles |
| 1326157-2 | 1-Blocking | BT1326157 | Observed multiple containers restarting and cores generating after PXE installation |
| 1496977-1 | 2-Critical | BT1496977 | Remote GID mappings to F5OS roles are disconnected for TACACS+/RADIUS authentication methods. |
| 1469925-1 | 2-Critical | BT1469925 | Timezone changes are not reflected in the log messages until the hardware is rebooted |
| 1436153-1 | 2-Critical | BT1436153 | F5OS upgrades fail when SNMP configuration contains special characters. |
| 1397145-2 | 2-Critical | BT1397145 | Unable to add blade to Openshift cluster if VELOS partition root password is expired or locked |
| 1378805-4 | 2-Critical | BT1378805 | Error occurs when changing LAG type for an existing LAG interface on webUI |
| 1366337-2 | 2-Critical | BT1366337 | Adding a system raid drive fails after successful removal |
| 1365985-2 | 2-Critical | BT1365985 | GID role mapping may not work with secondary GID |
| 1365821-2 | 2-Critical | BT1365821 | Traffic loss of 5-10 seconds after disable/enable of LACP Lag member on r5000/r10000 |
| 1355277-4 | 2-Critical | BT1355277 | Incorrect Vlan Listeners when a Static FDB is configured |
| 1352449-7 | 2-Critical | BT1352449 | iHealth upload is failing with error "certificate signed by unknown authority" |
| 1352421-2 | 2-Critical | BT1352421 | L2 services (LACP/LLDP) are down on r2000 and r4000 series appliances |
| 1332997-2 | 2-Critical | BT1332997 | Device stuck at "unmounting containers" after performing reboot |
| 1330717-2 | 2-Critical | BT1330717 | LLDP neighbors are not getting discovered |
| 1328405-2 | 2-Critical | BT1328405 | F5OS system stopped generating tmstat snapshots |
| 1320637-3 | 2-Critical | BT1320637 | DMA Agent crash after SEP file mapping error |
| 1317793-1 | 2-Critical | BT1317793 | F5OS qat-support-pod service crashed with SIGBUS error |
| 1314917-2 | 2-Critical | BT1314917 | Command "show system health components component psu-2" results in errors |
| 1313329-2 | 2-Critical | BT1313329 | Downloaded F5OS ISO file missing after reboot |
| 1311953-1 | 2-Critical | BT1311953 | Platform-services-deployment service does not come up when system reboots early after PXE install |
| 1305909 | 2-Critical | BT1305909 | iHealth upload not supported on F5OS-A |
| 1305005-3 | 2-Critical | BT1305005 | Error handling in F5OS file-download API |
| 1304765-2 | 2-Critical | BT1304765 | A remote LDAP user with an admin role is unable to make config changes through the F5 webUI |
| 1301837-3 | 2-Critical | BT1301837 | A remote admin user is not able to enter the ConfD config mode when logged in from SSH |
| 1300749-2 | 2-Critical | K000135373, BT1300749 | Syslog target files do not use the hostname configured via system user interface. |
| 1298329-2 | 2-Critical | BT1298329 | F5OS tcpdump capture fails to run after F5OS software downgrade★ |
| 1296997-2 | 2-Critical | BT1296997 | Large core files can cause system instability |
| 1295657-1 | 2-Critical | BT1295657 | ARP probes to rSeries management IP are answered by both mgmt and mgmt0-system |
| 1294341-1 | 2-Critical | BT1294341 | The system freezes if abruptly rebooted during software upgrade process. |
| 1291461-3 | 2-Critical | BT1291461 | LCD shutdown does not work on r2800 and r4800 platforms |
| 1283641-1 | 2-Critical | BT1283641 | Docker network is not updating as part of internal IP ranges configurations |
| 1280749-2 | 2-Critical | BT1280749 | OCSP server state data and actual configured data is different in ConfD CLI |
| 1271973-2 | 2-Critical | BT1271973 | Disabling 1G/10G BaseT interface in F5OS does not make the link down on the peer port |
| 1270473-3 | 2-Critical | BT1270473 | On firmware upgrade from CLI, wrong console message displayed |
| 1267205-1 | 2-Critical | BT1267205 | Status field in "show system image" reports error when upgrading to 1.5.0★ |
| 1256897-4 | 2-Critical | BT1256897 | Deleting an ECDSA curve using the CLI takes a while to restart the http-server with the default RSA certificate. |
| 1252445-2 | 2-Critical | BT1252445 | QKView is collecting iptable dump only for filter table but not for raw, mangle, and nat |
| 1252377-4 | 2-Critical | BT1252377 | VXLAN-GPE and GENEVE are disabled by default when software is upgraded from F5OS-A 1.3.0 build to F5OS-A 1.4.0★ |
| 1240749-1 | 2-Critical | BT1240749 | F5OS systems send incomplete DDoS stats response to the tenants |
| 1229449-1 | 2-Critical | BT1229449 | Username is not logged on rSeries appliance when webUI authentication fails |
| 1225701-1 | 2-Critical | BT1225701 | Filenames with special characters in /var/import/staging cause upgrade to fail |
| 1204985-2 | 2-Critical | BT1204985 | The root-causes of F5OS upgrade compatibility check failures are hidden in /var/log/sw-util.log. |
| 1204433-2 | 2-Critical | BT1204433 | "Appliance-mode" flag in license should not be used to enable appliance-mode |
| 1136725-2 | 2-Critical | BT1136725 | An iptables CLI error |
| 1099069-2 | 2-Critical | BT1099069 | Issues with pulling files from F5OS device using SCP |
| 1069365-3 | 2-Critical | BT1069365 | Error shown when configuring known-host for file transfer when FIPS mode is enabled` |
| 1047689-4 | 2-Critical | BT1047689 | Sw_rbcast core file found on system |
| 1558797-1 | 3-Major | BT1558797 | BMC self health test falsely logged as failed |
| 1492621 | 3-Major | BT1492621 | Config-restore fails when backup file has expiry-status field for admin or root user |
| 1486697-1 | 3-Major | BT1486697 | Configuring Expiry-status of root and admin users should not be allowed |
| 1469385-1 | 3-Major | BT1469385 | GUI freezes during LDAP user authentication if no remote GID mapped locally. |
| 1466397-2 | 3-Major | BT1466397 | LDAP authentication is consuming several minutes to authenticate via GUI and SSH. |
| 1441505 | 3-Major | BT1441505 | iHealth upload client may fail if ConfD database is offline. |
| 1441425-1 | 3-Major | BT1441425 | The rSeries appliance log shows "PSU voltage out value < lower limit, value=0". |
| 1437765 | 3-Major | BT1437765 | Restoration of system configuration database may fail if admin user was previously modified |
| 1436373 | 3-Major | BT1436373 | iHealth upload not supported on F5OS-A |
| 1429721-1 | 3-Major | BT1429721 | SCP as non-root user does not report errors correctly for bad/non-existent files. |
| 1393269-1 | 3-Major | BT1393269 | Error log: "PINGLOOP Failed to ssh to 127.0.0.1" |
| 1388945-1 | 3-Major | BT1388945 | Fan speed randomly shows as '0'. |
| 1388745-1 | 3-Major | BT1388745 | Large numbers of platform-hal errors logged in platform.log: "Requested Sensor, data, or record not present." |
| 1379625-4 | 3-Major | BT1379625 | Changing the max-age attribute in password policy is not reflecting immediately |
| 1359897-2 | 3-Major | BT1359897 | rSeries link down events can be missed |
| 1354341-3 | 3-Major | BT1354341 | Changing a VLAN from trunked (tagged) to native (untagged) on a LAG in a single transaction can cause traffic outage |
| 1351529-2 | 3-Major | BT1351529 | Fixing the log issue stating "UNSUPPORTED STP state" when STP global is configured |
| 1349465-4 | 3-Major | BT1349465 | Partition s/w upgrade compatibility check doesn't use correct target version |
| 1338521-2 | 3-Major | BT1338521 | Unable to login when accessing F5OS GUI through a network proxy on a port other than 443. |
| 1329161-3 | 3-Major | BT1329161 | In non-FIPS mode, added support for the SSH-RSA host key algorithm |
| 1324737-1 | 3-Major | BT1324737 | The output of the command "ethtool --show-priv-flags" on all interfaces needs to be collected in QKView |
| 1316097-3 | 3-Major | BT1316097 | LAGs not programmed when adding VLAN to LAG |
| 1315149-4 | 3-Major | BT1315149 | Users authenticated via TACACS+ cannot log in via serial console |
| 1312169-2 | 3-Major | BT1312169 | User expiration is not configurable nor viewable on the webUI |
| 1311049-1 | 3-Major | BT1311049 | For a system that has interfaces with 1GB speed, the network tab on the webUI dashboard is not showing all information |
| 1306649-1 | 3-Major | BT1306649 | Rapid removal and re-insertion of 10G optics may result in link failure |
| 1301169-1 | 3-Major | BT1301169 | K3S goes down when OMD is restarted |
| 1300805-1 | 3-Major | BT1300805 | Allowing the tenant configuration with more memory than max memory in the appliance |
| 1296525-2 | 3-Major | BT1296525 | qkview may capture log files truncated in a reverse way |
| 1294581-2 | 3-Major | BT1294581 | WebUI header shows FQDN for IP address field instead of management IP |
| 1290617-2 | 3-Major | BT1290617 | Display option "universal-time" is not supported |
| 1290053-1 | 3-Major | VELOS Software version may not be collected consistently across platform by QKView | |
| 1289633-2 | 3-Major | BT1289633 | FIPS devices show incorrect vCPUs |
| 1289029-3 | 3-Major | Toggling lag-type can sometimes cause an F5OS LACP aggregation to pass traffic while the peer does not have LACP configured. | |
| 1288937-2 | 3-Major | BT1288937 | Interface persists with removed VLAN |
| 1284269-1 | 3-Major | BT1284269 | Config restore fails if it contains an SNMP user |
| 1270837-2 | 3-Major | BT1270837 | The Account Locked field on the Edit User page does not lock out users nor display correct locked status |
| 1270309-1 | 3-Major | BT1270309 | Audit.log may log incorrect username initially for users logging into the CLI, remotely-authenticated users may see hostname in prompt reported as "appliance-1", and remotely-authenticated LDAP users may experience lengthy delays when authenticating |
| 1256437-1 | 3-Major | BT1256437 | Interface with a default route with gateway is NOT available |
| 1240565-2 | 3-Major | BT1240565 | Not allowing special characters "/*!<>^,/" in SNMP community/user/target name |
| 1211673-2 | 3-Major | BT1211673 | Default tenant disk size is based on tenant image type |
| 1205409-2 | 3-Major | BT1205409 | Cannot export or download files from diags/shared/tcpdump path |
| 1181929-3 | 3-Major | BT1181929 | F5OS install may partially fail, leaving system with mismatched OS and services★ |
| 1132569-1 | 3-Major | BT1132569 | "cdb_exists failed" error logged in platform.log during boot up |
| 1008701-2 | 3-Major | BT1008701 | Using curl to access 'scp:' URIs on the partition management IP does not work |
| 1128877-2 | 4-Minor | BT1128877 | Mount command added to QKView collection |
Cumulative fixes from F5OS-A v1.5.1 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description |
| 1285669-3 | CVE-2022-21216 | K000133432 | CVE-2022-21216 - Intel BIOS vulnerabilities on r2000/r4000 and r5000/r10000/r12000 |
Functional Change Fixes
None
F5OS-A Fixes
| ID Number | Severity | Links to More Info | Description |
| 1326837 | 1-Blocking | BT1326837 | Using UI, unable to configure the account expiry date for the user as the request is not delivered to the backend. |
| 1326541-2 | 1-Blocking | BT1326541 | In r2000 and r4000 systems, alarm LED is not set when there are alerts raised in the system |
| 1315121-1 | 1-Blocking | BT1315121 | Key migration failure and potential corruption updating to 1.5.0 or later with deployed tenants |
| 1315065-4 | 1-Blocking | BT1315065 | RSA-1024 SSH public keys should not be allowed in FIPS mode |
| 1314453-1 | 1-Blocking | BT1314453 | Datapath is broken when LAG type is changed from LACP to Static on r2000/r4000 platforms |
| 1293305-2 | 1-Blocking | BT1293305 | LAG interface status is not updated on the BIG-IP tenant |
| 1281857-1 | 1-Blocking | BT1281857 | Repeated disabling and enabling of link partner interface might result in datapath corruption |
| 1217169-2 | 1-Blocking | BT1217169 | Disk full: Latest ISO is not getting imported★ |
| 1188921-1 | 1-Blocking | BT1188921 | tcpdump not working after upgrade |
| 1184429-1 | 1-Blocking | BT1184429 | Specifying "operation not supported" as an iHealth qkview description or SR number will disable iHealth uploading |
| 1328977-1 | 2-Critical | BT1328977 | Appliance_orchestration_manager free invalid pointer error and restart |
| 1328729 | 2-Critical | BT1328729 | Slow memory leak when processing tenant telemetry |
| 1327701-4 | 2-Critical | BT1327701 | Space in SNMP community/user/target name causing snmpd container restart |
| 1326725-4 | 2-Critical | BT1326725 | Unable to generate SNMP Trap for IPV6 |
| 1304657-1 | 2-Critical | BT1304657 | Tcam-manager does not support all the possible system network subnets |
| 1286165-1 | 2-Critical | BT1286165 | Ping failing after removing aggregate ID from interface and adding trunk VLANs in the same commit |
| 1285149-3 | 2-Critical | BT1285149 | Patch releases report the wrong version in various log files. |
| 1280237-1 | 2-Critical | BT1280237 | Notification streams are sometimes empty using 'restconf/streams/platform-stats/json' API endpoint |
| 1297665-1 | 3-Major | BT1297665 | Occasionally diagnostic agent reports as unhealthy for unpopulated PSU_Slot in health summary and ihealth reports |
| 1286285-3 | 3-Major | BT1286285 | ISO with special characters in name will not import |
Cumulative fixes from F5OS-A v1.5.0 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description |
| 1232309 | CVE-2020-10754 | K000132761, BT1232309 | CVE-2020-10754: nmcli did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings |
| 1183909-2 | CVE-2018-20060 CVE-2019-11236 CVE-2019-11324 CVE-2018-18074 | K000133448, BT1183909 | Python urllib3 vulnerabilities CVE-2018-20060, CVE-2019-11236, CVE-2019-11324, CVE-2018-18074 |
| 1292405-1 | CVE-2022-25147 | K000137702, BT1292405 | CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64 |
| 1284193-1 | CVE-2021-20277 CVE-2021-25217 CVE-2022-28733 |
K000132893, BT1284193 | GRUB2 vulnerability CVE-2022-28733, Samba vulnerability CVE-2021-20277, DHCP vulnerability CVE-2021-25217 |
| 1281141-1 | CVE-2022-37434 | K67213091, BT1281141 | CVE-2022-37434 in zlib-1.2.7-20.el7_9 |
| 1273581-1 | CVE-2023-25690 | K000133098, BT1273581 | CVE-2023-25690 httpd: HTTP request splitting with mod_rewrite and mod_proxy |
| 1266197-2 | CVE-2022-4254 | K000136157, BT1266197 | CVE-2022-4254 sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters |
| 1263941-2 | CVE-2023-22809 | K000132667, BT1263941 | CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user |
| 1253713-3 | CVE-2020-15999 | K000133070, BT1253713 | CVE-2020-15999 freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png |
| 1207189-3 | CVE-2022-38178 | K000137229, BT1207189 | CVE-2022-38178 in bind-license-32:9.11.4-26.P2.el7_9.7 |
| 1207185-2 | CVE-2022-38178 | K000137229, BT1207185 | CVE-2022-38178 in bind-export-libs-32:9.11.4-26.P2.el7_9.7 |
| 1207181-2 | CVE-2022-38177 | K27155546, BT1207181 | CVE-2022-38177 in bind-license-32:9.11.4-26.P2.el7_9.7 |
| 1166149-1 | CVE-2021-27803 | K000135433, BT1166149 | CVE-2021-27803 wpa_supplicant: Use-after-free in P2P provision discovery |
| 1281749-1 | CVE-2023-36494 | K000134922, BT1281749 | Hashed/encrypted passwords are getting logged |
Functional Change Fixes
None
F5OS-A Fixes
| ID Number | Severity | Links to More Info | Description |
| 1290949-1 | 1-Blocking | BT1290949 | Invalid memory read in appliance orchestration manager |
| 1290941-1 | 1-Blocking | BT1290941 | LLDP/STPD/LACPD in rSeries is flooding SEP_POLLERR when dma-agent restarts |
| 1285969 | 1-Blocking | BT1285969 | Some aggregation interface names can cause ethernet interfaces in LACP aggregations to be erroneously down |
| 1282757 | 1-Blocking | K000133379, BT1282757 | On upgrade, systems might overwrite key due to automatic firmware updating |
| 1281861 | 1-Blocking | BT1281861 | Tenants are stuck in Pending state with status 0/1 nodes available after upgrading to F5OS-A 1.2.0 |
| 1281165-1 | 1-Blocking | CVE-2023-0767 in nss-tools-3.67.0-4.el7_9 | |
| 1281157-1 | 1-Blocking | CVE-2023-0767 in nss-sysinit-3.67.0-4.el7_9 | |
| 1281149-1 | 1-Blocking | CVE-2023-0767 in nss-3.67.0-4.el7_9 | |
| 1273445 | 1-Blocking | BT1273445 | Downgrade/upgrade issues are seen because ISO has special characters in the file name★ |
| 1269989-2 | 1-Blocking | BT1269989 | tcam-manager may get stuck using 100% CPU |
| 1267253-2 | 1-Blocking | BT1267253 | LDAP shadowExpire attribute not honored |
| 1250901-2 | 1-Blocking | BT1250901 | On rSeries FIPS system live upgrade, cavium_n3fips (liquidsec_pf_vf driver) may fail to come into operational state |
| 1232369 | 1-Blocking | BT1232369 | Intel Microcode update |
| 1226505-2 | 1-Blocking | BT1226505 | Average transactions per second impacted in certain cases |
| 1225989-2 | 1-Blocking | BT1225989 | TACACS users only able to access CLI, not webUI |
| 1280365-3 | 2-Critical | K000133253, BT1280365 | WebUI and shell admin access unavailable after upgrade to when one of the previously installed images is no longer present★ |
| 1273025-1 | 2-Critical | BT1273025 | Once TACACS server-group is configured on a non-default port, on downgrade virt-handler pod gets into a crash loopbackoff state because of SELinux corruption |
| 1273021-1 | 2-Critical | BT1273021 | ISOs imported with regex special characters in their names are getting deleted★ |
| 1249773-2 | 2-Critical | BT1249773 | QKView may fail to collect all files for platform-monitor container |
| 1231357 | 2-Critical | BT1231357 | Unexpected reboot might occur on r5000/r10000 Series |
| 1215917 | 2-Critical | BT1215917 | webUI failed to load when downgrading from 1.5.0 to 1.3.1 with self-signed certificate with encrypted RSA key type |
| 1211025 | 2-Critical | BT1211025 | Firmware update interrupted during OS install★ |
| 1204481 | 2-Critical | K000132166, BT1204481 | System may flap external links multiple times during startup or links may fail to come up at all |
| 1184821 | 2-Critical | BT1184821 | Obscure crash in external authenticator |
| 1137121-3 | 2-Critical | BT1137121 | Tenants are stuck in Pending state with status 0/1 nodes available after upgrading to F5OS-A 1.2.0 |
| 1136597-3 | 2-Critical | BT1136597 | LDAP user with admin and operator role gets only operator permissions |
| 1273845-1 | 3-Major | BT1273845 | Removing or manually adding TLS Certificate & Key on webUI removes whole TLS configuration |
| 1273017-1 | 3-Major | BT1273017 | LACPD restarts when changing aggregation lag-type through configuration utility webUI |
| 1251981 | 3-Major | BT1251981 | Speed on webUI Interfaces screen is empty for 1GB |
| 1239325 | 3-Major | BT1239325 | Issue when Management IP address is configured to have public internet access on F5OS |
| 1236857-1 | 3-Major | BT1236857 | F5OS OID SNMPv2-MIB::sysDescr provides meaningless information for system controller |
| 1234049 | 3-Major | BT1234049 | The Add/Edit tenant deployment screen on the r4600 webUI does not have the option for 12 vCPUs in the vCPUs dropdown |
| 1230609 | 3-Major | BT1230609 | Neighbor interface description is not updated in LLDP neighbor details |
| 1229465-3 | 3-Major | BT1229465 | QKView is not collecting core files in /var/crash |
| 1226429 | 3-Major | BT1226429 | "DEBUG cannot reply twice on the same call" log reporting repeatedly |
| 1207485-1 | 3-Major | BT1207485 | LACP daemon restarts when changing lag-type of the aggregation |
| 1188053 | 3-Major | BT1188053 | SSH idle-timeout support |
| 1185701-2 | 3-Major | BT1185701 | 'system aaa' command in ConfD fails with "Error: application communication failure" |
| 1185497-3 | 3-Major | BT1185497 | Tenant health in the partition shows additional entries that are not part of the tenant configuration |
| 1181721 | 3-Major | BT1181721 | Add additional commands and files to QKView collection |
| 1165973-2 | 3-Major | BT1165973 | Application error while using the CLI command "show components" |
| 1118109-2 | 3-Major | CVE-2019-15605: HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed | |
| 1225981-1 | 4-Minor | BT1225981 | Files greater then 1000 MiB are truncated in QKView |
| 1211861 | 4-Minor | BT1211861 | Configured input values of IP address fields reset to default upon switching the protocol |
| 1211777 | 4-Minor | BT1211777 | Configured input values of IP address fields reset to default upon switching the protocol |
| 1190369 | 4-Minor | BT1190369 | Terminal window not reflecting configured hostname |
| 1167761-2 | 4-Minor | BT1167761 | Directory indexing enabled for management webUI |
Cumulative fix details for F5OS-A v1.5.4 that are included in this release
2130349 : Older BIG-IP image import fails with signature verification
Component: F5OS-A
Symptoms:
The TMOS tenant images prior to certificate rotation fail to verify the signature.
An error is logged:
appliance-1.chassis.local image-agent[14]: priority="Err" version=1.0 msgid=0x2002000000000010 msg="Failed to verify image signature. Removed." IMAGE="<image>.tar.bundle" FAILURE="signature".
Conditions:
Importing a BIG-IP tenant image that was released prior to certificates being rotated.
Impact:
You can't import the image. But images that were imported before the F5OS-A upgrade continue to work.
Workaround:
Import a BIG-IP tenant image which has had its certificates rotated.
Fix:
Updated the F5OS-A image verification to successfully verifies the TMOS tenant images contain certificate rotation.
2078301-1 : dagd may crash if a malicious message is sent from the tenant
Links to More Info: K000156796, BT2078301
2063565-2 : CVE-2022-23219: glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
Links to More Info: K52308021
2063545-2 : CVE-2022-23218: glibc: Stack-based buffer overflow in svcunix_create via long pathnames
Links to More Info: K52308021
2050869 : CVE-2022-41721 x/net/http2/h2c: request smuggling
Component: F5OS-A
Symptoms:
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
Conditions:
NA
Impact:
Potentially leading to the server misinterpreting request boundaries and processing unintended or malicious HTTP/2 requests.
Workaround:
NA
Fix:
Upgraded to golang.org/x/net v0.38.0
2050865 : CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
Component: F5OS-A
Symptoms:
There's an uncontrolled resource consumption flaw in golang's net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http's http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.
Conditions:
NA
Impact:
Can trigger excessive resource and CPU consumption
Workaround:
NA
Fix:
Upgraded to golang.org/x/net v0.38.0
2050861 : CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
Component: F5OS-A
Symptoms:
A flaw was found in golang. An attacker can craft an input to ParseFragment within parse.go that would cause it to enter an infinite loop and never return. The greatest threat to the system is of availability.
Conditions:
NA
Impact:
A specially crafted input may cause ParseFragment to enter an infinite loop, resulting in application hang and denial of service.
Workaround:
NA
Fix:
Upgraded to golang.org/x/net v0.38.0
2050853 : CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
Component: F5OS-A
Symptoms:
A flaw was found in golang.org. In x/text, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.
Conditions:
An affected version of the golang.org/x/text library is present and the language.ParseAcceptLanguage function processes certain malformed BCP 47 language tags.
Impact:
May cause a "slice bounds out of range" panic
Workaround:
NA
Fix:
This issue is resolved by upgrading to golang.org/x/text v0.23.0.
2050845 : CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
Component: F5OS-A
Symptoms:
A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.
Conditions:
NA
Impact:
May cause excessive CPU usage, leading to significant performance degradation
Workaround:
NA
Fix:
Upgraded to golang.org/x/text v0.23.0
2050841 : CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
Component: F5OS-A
Symptoms:
A flaw was found in golang.org. In x/text, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.
Conditions:
NA
Impact:
May cause an "index out of range" panic
Workaround:
NA
Fix:
Upgraded to golang.org/x/text v0.23.0
2050833 : CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Component: F5OS-A
Symptoms:
A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows an attacker to cause applications using this package to parse untrusted input data to crash, leading to a denial of service of the affected component.
Conditions:
NA
Impact:
May trigger an out-of-bounds read and application panic, leading to a denial of service.
Workaround:
NA
Fix:
Upgraded to golang.org/x/text v0.23.0
2050825 : CVE-2022-41721 x/net/http2/h2c: request smuggling
Component: F5OS-A
Symptoms:
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
Conditions:
NA
Impact:
potentially leading to unauthorized actions or information disclosure.
Workaround:
NA
Fix:
Package has been upgraded to non vulnerable version.
2050801-2 : CVE-2017-16539 docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames
Component: F5OS-A
Symptoms:
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
Conditions:
The Docker engine version is earlier than 1.13.1 and
Docker containers are started with capabilities that allow write access to /proc/scsi/scsi.
Impact:
Containers with sufficient privileges could potentially remove SCSI devices from the host system, resulting in data loss or device unavailability.
Workaround:
NA
Fix:
This vulnerability is not present in Docker version v1.13.1 or later.
2050793-2 : CVE-2024-36623 moby: Race Condition in Moby's streamformatter Package
Component: F5OS-A
Symptoms:
A flaw was found in Moby's streamformatter package. This vulnerability allows data corruption or application crashes via multiple concurrent write operations triggered by a race condition
Conditions:
NA
Impact:
Users may experience data inconsistencies or unexpected termination of the application when concurrent write operations are invoked under specific runtime conditions.
Workaround:
NA
Fix:
This issue has been addressed with a fix
2050701-1 : CVE-2025-58754 axios: Axios DoS via lack of data size check
Component: F5OS-A
Symptoms:
Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.
Conditions:
A vulnerable version of Axios (prior to 0.30.2 and 1.12.0) is present and used in a Node.js environment to process URLs with the data: scheme.
Impact:
This will lead to DoS.
Workaround:
NA
Fix:
Axios has been updated to non-vulnerable version.
2008753-1 : Privilege Escalation to Admin via SSH Port Forwarding
Links to More Info: K000156771
2008505-5 : F5OS SCP hardening
Links to More Info: K000156771
2000389-3 : CVE-2018-10105 - tcpdump: SMB data printing mishandled
Links to More Info: K000156675
1999777-3 : CVE-2018-10103 - tcpdump: SMB data printing mishandled
Links to More Info: K000156675
1998753 : CVE-2021-3516 libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c
Component: F5OS-A
Symptoms:
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Conditions:
NA
Impact:
May trigger a use-after-free condition
Workaround:
Avoid processing untrusted or unknown XML files
Fix:
Applied upstream patches.
1998541 : CVE-2021-3518 libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c
Component: F5OS-A
Symptoms:
There's a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
Conditions:
NA
Impact:
May trigger a use-after-free condition
Workaround:
Avoid processing untrusted or unknown XML files
Fix:
Applied upstream patches.
1998521 : CVE-2021-3517 libxml2: Out-of-Bounds Read in XML Entity Encoding Functionality
Links to More Info: K03179547
1998417 : CVE-2022-29824 libxml2: Integer Overflow in Buffer Handling Functions Leading to Out-of-Bounds Writes
Component: F5OS-A
Symptoms:
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Conditions:
libxml2 before 2.9.14
Impact:
may trigger integer overflows in buffer handling functions, leading to out-of-bounds memory writes
Workaround:
Avoid processing untrusted or unusually large XML files
Fix:
Applied upstream patch
1998265 : CVE-2021-3537 libxml2: NULL Dereference Due to Improper Error Handling in Mixed Content Parsing Ask Explain
Component: F5OS-A
Symptoms:
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
Conditions:
libxml2 versions before 2.9.11
Impact:
May trigger a NULL pointer dereference
Workaround:
Avoid processing untrusted or unknown XML documents in recovery mode
Fix:
Applied upstream patches.
1998233 : CVE-2017-9047 libxml2: Buffer Overflow in xmlSnprintfElementContent
Component: F5OS-A
Symptoms:
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
Conditions:
An affected version of libxml2 (up to and including v2.9.4) is present and processes XML elements with complex content definitions using the xmlSnprintfElementContent function.
Impact:
A specially crafted XML file may trigger a buffer overflow
Workaround:
Avoid processing untrusted or specially crafted XML files
Fix:
Applied upstream patches.
1997969 : CVE-2017-16931 libxml2: Improper Handling of Parameter-Entity References
Component: F5OS-A
Symptoms:
parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.
Conditions:
libxml2 before 2.9.5
Impact:
May trigger improper handling of parameter-entity references, possibly leading to unexpected behavior
Workaround:
Avoid processing untrusted or unknown XML files
Fix:
Applied upstream patches.
1997929 : CVE-2022-23308 libxml2: Use-After-Free in ID and IDREF Attribute Handling
Links to More Info: K32760744
1996657-2 : CVE-2022-2817 vim: heap use-after-free in string_quote() at src/strings.c
Component: F5OS-A
Symptoms:
A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.
Conditions:
vim prior to 9.0.0212
Impact:
May trigger a use-after-free condition
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1996609-2 : CVE-2022-3296 vim: out-of-bound write in function ml_append_int
Component: F5OS-A
Symptoms:
A stack-based buffer overflow vulnerability was found in vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.
Conditions:
NA
Impact:
Users may observe unexpected termination or memory inconsistency during editing or buffer operations.
Workaround:
NA
Fix:
This issue has been adressed with a fix
1996593-2 : CVE-2022-3234 vim: Heap-based Buffer Overflow
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
Conditions:
NA
Impact:
The vim process may exit unexpectedly or produce inconsistent runtime behavior during editing.
Workaround:
NA
Fix:
The issue had been addressed with a fix
1996585-2 : CVE-2022-2816 vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c
Component: F5OS-A
Symptoms:
An out-of-bounds read vulnerability was found in Vim in the check_vim9_unlet function in the vim9cmds.c file. This issue occurs because of invalid memory access when compiling the unlet command when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the out-of-bounds read, causing the application to crash, possibly executing code and corrupting memory.
Conditions:
vim prior to 9.0.0211
Impact:
May trigger an out-of-bounds read
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1996529-2 : CVE-2022-2210 vim: out-of-bound write in function ml_append_int
Component: F5OS-A
Symptoms:
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
Conditions:
vim prior to 8.2
Impact:
Could trigger an out-of-bounds write
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1996329-2 : CVE-2022-2580 vim: Out-of-bounds Read in vim
Component: F5OS-A
Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.
Conditions:
vim prior to 9.0.0102
Impact:
May trigger a heap buffer overflow
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is fixed in vim-minimal-2:9.1
1996193-2 : CVE-2022-2285 vim: integer overflow in del_typebuf() at getchar.c
Component: F5OS-A
Symptoms:
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
Conditions:
vim prior to 9.0.
Impact:
May trigger an integer overflow or wraparound
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1995929-2 : CVE-2023-0433 vim: reading past the end of a line when formatting text
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
Conditions:
NA
Impact:
Users may experience unexpected program termination or inconsistent runtime behavior when performing specific input processing or editing operations under certain conditions.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1995773-2 : CVE-2022-3256 vim: use-after-free in movemark() at mark.c
Component: F5OS-A
Symptoms:
A heap use-after-free vulnerability was found in vim's movemark() function of the src/mark.c file. This issue occurs because vim uses freed memory when 'autocmd' changes the mark. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.
Conditions:
NA
Impact:
Users may observe unexpected termination of the application, or internal memory inconsistencies, which under certain conditions could lead to unpredictable behavior beyond the editing session
Workaround:
NA
Fix:
The issue had been addressed with a fix
1995661-2 : CVE-2023-0512 vim: divide by zero in adjust_skipcol() at move.ca
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
Conditions:
NA
Impact:
Users may encounter unexpected program termination when window width becomes very narrow under certain input conditions.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1995613-2 : CVE-2022-2207 vim: heap-based buffer overflow in function ins_bs
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Conditions:
vim prior to 8.2.
Impact:
May result in a heap-based buffer overflow
Workaround:
Do not open untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1995465-2 : CVE-2022-2889 vim: use-after-free in find_var_also_in_script() in evalvars.c
Component: F5OS-A
Symptoms:
A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.
Conditions:
NA
Impact:
Users may observe unexpected termination of the process
Workaround:
NA
Fix:
The issue has been adressed by improving internal memory handling for specific input conditions
1995445-2 : CVE-2022-2287 vim: out of bounds read in suggest_trie_walk() at spellsuggest.c
Component: F5OS-A
Symptoms:
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Conditions:
vim prior to 9.0
Impact:
May trigger an out-of-bounds read
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1995353-2 : CVE-2022-2581: vim: Out-of-bounds Read in vim src/regexp.c
Component: F5OS-A
Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.
Conditions:
vim prior to 9.0.0104
Impact:
May trigger a heap buffer overflow
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1995349-2 : CVE-2022-2571 vim: Heap-based Buffer Overflow in vim
Component: F5OS-A
Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.
Conditions:
vim prior to 9.0.0101
Impact:
May trigger a heap buffer overflow
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1995341-2 : CVE-2022-3352 vim: use after free
Component: F5OS-A
Symptoms:
Use After Free in GitHub repository vim/vim prior to 9.0.0614.
Conditions:
NA
Impact:
Users may observe unexpected termination of vim or internal memory inconsistencies during buffer operations.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1995337-2 : CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
Component: F5OS-A
Symptoms:
A flaw was found in golang.org. In x/text, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.
Conditions:
NA
Impact:
may cause a panic with "index out of range"
Workaround:
NA
Fix:
We are not using the package
1995157-2 : CVE-2022-2182 vim Heap-based Buffer Overflow
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Conditions:
vim prior to 8.2.
Impact:
Could lead to a heap-based buffer overflow
Workaround:
Avoid opening files from untrusted sources
Fix:
This issue is addressed in vim-minimal-2:9.1
1995097-2 : CVE-2022-2125 vim Heap-based Buffer Overflow
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Conditions:
A vulnerable version of vim (prior to 8.2)
Impact:
Could result in a heap-based buffer overflow
Workaround:
Avoid opening untrusted or unknown files with vulnerable versions of vim.
Fix:
The issue is resolved in vim-minimal-2:9.1
1995077-2 : CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
Component: F5OS-A
Symptoms:
A flaw was found where a maliciously crafted pf2 font could lead to an out-of-bounds write in grub2. A successful attack can lead to memory corruption and secure boot circumvention.
Conditions:
NA
Impact:
May trigger an out-of-bounds write
Workaround:
Avoid using untrusted or unknown pf2 font files
Fix:
Resolved by upgrading grub
1995037-2 : CVE-2022-3705 vim: a use after free in the function qf_update_buffernt
Component: F5OS-A
Symptoms:
A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.
Conditions:
NA
Impact:
Users may observe unexpected termination of vim or internal memory inconsistencies during quickfix buffer operations.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1994969-2 : CVE-2022-2946 vim-minimal-7.4.629-6.el7.x86_64.rpm: Use After Free in GitHub repository vim/vim prior to 9.0.0246
Component: F5OS-A
Symptoms:
A flaw was found in vim, where it is vulnerable to a use-after-free in the vim_vsnprintf_typval function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.
Conditions:
This issue can manifest when vim is used in workflows that handle dynamic input evaluation or formatted string operations.
Impact:
Users might see vim exit unexpectedly or behave inconsistently in those workflows.
Workaround:
NA
Fix:
The issue has been adressed
1994953-2 : CVE-2022-2284 vim: out of bounds read in utfc_ptr2len() at mbyte.c
Component: F5OS-A
Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Conditions:
vim prior to 9.0.
Impact:
May trigger a heap-based buffer overflow
Workaround:
Do not open untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1994929-2 : CVE-2022-2819 vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c
Component: F5OS-A
Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.
Conditions:
vim prior to 9.0.0210
Impact:
A specially crafted input file may trigger a heap buffer overflow.
Workaround:
Avoid opening untrusted or unknown files
Fix:
This issue is resolved in vim-minimal-2:9.1
1994669-2 : CVE-2023-0051 vim: heap-based buffer overflow in msg_puts_printf() in message.c
Component: F5OS-A
Symptoms:
A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.
Conditions:
NA
Impact:
Users may observe unexpected termination of vim or memory inconsistencies during message formatting operations.
Workaround:
https://access.redhat.com/security/cve/cve-2023-0051
Fix:
This issue has been addressed with a fix
1994637-2 : CVE-2023-3138 - libX11: Out-of-bounds request/event/error ID handling in InitExt.c
Component: F5OS-A
Symptoms:
A client application may crash (due to memory corruption) when interacting with a malicious or misbehaving X server or proxy that sends out-of-bounds Request / Event / Error IDs.
Conditions:
libX11 (vulnerable versions, < 1.8.6)
Impact:
Memory corruption (within the Display structure), leading to client crash (denial of service)
Workaround:
NA
Fix:
LibX11 has been removed, as it was unused
1994593-2 : CVE-2020-14363 - libX11: Integer overflow leading to double-free in locale handling
Component: F5OS-A
Symptoms:
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
Conditions:
The application must be compiled with libX11 using a vulnerable version (prior to 1.6.12)
Impact:
May result in a double-free condition, potentially causing the application to crash or, in some cases, leading to arbitrary code execution.
Workaround:
NA
Fix:
LibX11 has been removed, as it was unused
1994517-2 : CVE-2022-2126 vim: out of bounds read in suggest_trie_walk()
Component: F5OS-A
Symptoms:
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Conditions:
vim prior to 8.2
Impact:
Could lead to an out-of-bounds read
Workaround:
Do not open untrusted or unknown files
Fix:
This issue is fixed in vim-minimal-2:9.1
1994465-2 : CVE-2022-2862 vim: heap use-after-free in generate_PCALL() at src/vim9instr.c
Component: F5OS-A
Symptoms:
Use After Free in GitHub repository vim/vim prior to 9.0.0221.
Conditions:
vim prior to 9.0.0221.
Impact:
Successful exploitation may trigger a use-after-free condition
Workaround:
Do not open untrusted or unknown files
Fix:
This issue is addressed in vim-minimal-2:9.1
1994449-2 : CVE-2023-0054 vim-minimal-7.4.629-6.el7.x86_64.rpm: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
Component: F5OS-A
Symptoms:
An out-of-bounds write flaw was found in Vim, in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to a missing check of the return value of the vim_regsub function when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file to trigger the out-of-bounds write, causing the application to crash.
Conditions:
NA
Impact:
Users may experience unexpected termination of vim or internal inconsistencies during substitution operations.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1959845-5 : CVE-2022-48340: glusterfs: heap use-after-free in dht_setxattr_mds_cbk() in dht-common.c
Component: F5OS-A
Symptoms:
A flaw was found in Gluster, where GlusterFS is vulnerable to a denial of service caused by an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free. By sending a specially-crafted request, a remote attacker can cause a denial of service.
Conditions:
NA
Impact:
Clients may experience service interruption or unexpected termination of GlusterFS in certain operating scenarios.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1953653-4 : cve-2022-27406: Freetype: Segmentation violation via FT_Request_Size
Links to More Info: K000141126
1857245-2 : CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange
Component: F5OS-A
Symptoms:
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.
Conditions:
The SSH server implementation must support file transfer protocols over golang.org/x/crypto/ssh < 0.35.0
Impact:
DoS: the server’s memory or other resources may be exhausted, making it unavailable to legitimate users.
Workaround:
NA
Fix:
The vulnerability is fixed in golang.org/x/crypto/ssh v0.35.0 and above.
1857197-1 : CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange
Component: F5OS-A
Symptoms:
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.
Conditions:
The SSH server implementation must support file transfer protocols over golang.org/x/crypto/ssh < 0.35.0
Impact:
DoS: the server’s memory or other resources may be exhausted, making it unavailable to legitimate users.
Workaround:
NA
Fix:
The vulnerability is fixed in golang.org/x/crypto/ssh v0.35.0 and above.
1857001-2 : CVE-2025-27152: axios vulnerability
Component: F5OS-A
Symptoms:
When passing absolute URLs to axios, even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage.
Conditions:
When passing absolute URLs to axios.
Impact:
Affected code is in our product but cannot be exploited in any normal configuration
Workaround:
N/A
Fix:
Upgraded axios to a non-vulnerable version.
1782497-1 : CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder
Component: F5OS-A
Symptoms:
A malicious HTTP/2 stream can cause excessive CPU usage on the server, due to expensive HPACK decoding operations.
Conditions:
Golang < 1.19.6
Impact:
Denial of Service, availability is affected
Workaround:
NA
Fix:
The vulnerability is fixed in golang 1.20.0 and above.
1780721-2 : CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder
Component: F5OS-A
Symptoms:
A malicious HTTP/2 stream can cause excessive CPU usage on the server, due to expensive HPACK decoding operations.
Conditions:
Golang < 1.19.6
Impact:
Denial of Service, availability is affected
Workaround:
NA
Fix:
The vulnerability is fixed in golang 1.20.0 and above.
1780617-2 : CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames
Links to More Info: K000148640
1753033-2 : Snmp is not working if mgmt is in 172.17.x.x network in 1.8.0★
Links to More Info: BT1753033
Component: F5OS-A
Symptoms:
The snmpwalk command times out after an upgrade.
Conditions:
-- The management IP address is in the 172.17.x.x network
-- The system is upgraded from 1.5.2
Impact:
The snmpwalk command fails if the management IP is in 172.17.x.x network in 1.8.0
Workaround:
Remove the iptables entries with 172.x network as source from the file /etc/sysconfig/iptables and reboot the system
Steps are as below
Verify existing entries:
# iptables-save | grep 172.17
-A POSTROUTING -s 172.17.0.0/16 ! -o br-97c791a9e730 -j MASQUERADE
-A POSTROUTING -s 172.17.0.0/16 ! -o br-e4f09d90e378 -j MASQUERADE
Make a backup of the iptables file
# cp /etc/sysconfig/iptables /etc/sysconfig/iptables.bak
Edit the entries in the iptables file
# grep -v '\-s 172.' /etc/sysconfig/iptables.bak > /etc/sysconfig/iptables
Run this command:
# iptables-save | grep -vF 172.17.0.0/16 > iptables
Reboot the device:
# reboot
Verify entries. Either of these commands should return no results
# iptables-save | grep 172.17
# grep '172.17' /etc/sysconfig/iptables
Fix:
During the upgrade from 1.5.2 to any higher version, the iptables for default docker network (172 network) are removed
1730833-2 : Tmm may egress broadcast traffic even when VLANs are disabled in F5OS
Links to More Info: BT1730833
Component: F5OS-A
Symptoms:
In certain scenarios such as restoring a UCS on an F5OS tenant, if the VLANs in F5OS are disabled, tmm may egress broadcast traffic such as gratuitous ARPs onto the disabled VLANs.
Conditions:
-- An F5OS tenant where VLANs were assigned and then removed.
-- An F5OS tenant where tmm is not in forced-offline mode.
-- An action occurs on the tenant (such as restoring a UCS or restarting tmm, or loading the config) that results in gratuitous ARPs.
Impact:
This could cause IP address conflicts on the network or other issues related to unexpected broadcast traffic such as gratuitous ARPs on the network.
Workaround:
- In F5OS, remove the affected VLANs from the LAG or interface.
- On the tenant use forced offline to prevent traffic egress.
- If you are restoring a UCS from another BIG-IP such as for a platform migration, put the source BIG-IP into forcedoffline state before taking the UCS.
- delete the tenant, and recreate without any VLANs assigned.
Fix:
A single tenant with a vlan that was configured and then removed via F5OS will no longer leak broadcast traffic onto the network on the removed vlan.
This fix does not address the issue when multiple tenants are attached to the same vlan. F5 has created ID1758957 for that issue.
1713073-2 : F5OS rSeries spontaneous reboot after upgrade★
Links to More Info: K000148566, BT1713073
Component: F5OS-A
Symptoms:
After upgrading, the device reboots unexpectedly.
Pel logs have this signature:
11/05/2024 21:24:47 | 5753 | AOM | 255 | Network Access | 0 | CPU internal error event
11/05/2024 21:24:47 | 5754 | AOM | 255 | Network Access | 5 | ME PECI is not functional, resetting host
11/05/2024 21:24:47 | 5755 | AOM | 255 | Network Access | 5 | ... reason: 0xFF ME IPMI 'other error'
11/05/2024 21:24:47 | 5756 | AOM | 255 | Network Access | 6 | lop host reset event
Conditions:
-- rSeries 5xxx, 10xxx, 12xxx system
-- Upgrade to version 1.8.0 build 16036
Impact:
Spontaneous system restart could occur.
Workaround:
A BIOS change occurred in the F5OS 1.8.0 build 16036 upgrade that enables CMS ENABLE DRAM PM. Disabling it will mitigate this.
For instructions on how to perform this procedure, see K000148566: F5 rSeries systems may silently reboot after upgrading to F5OS-A 1.8.0 at https://my.f5.com/manage/s/article/K000148566.
Fix:
Fixes introduced in F5OS-A-1.8.0-17564.R5R10.EHF-1.iso
1712009 : Attempting to perform a configuration restore, after downgrading from v1.8.0, makes the system inoperable★
Links to More Info: BT1712009
Component: F5OS-A
Symptoms:
After a downgrading from v1.8.0 and reset-to-default process, ConfD fails to start.
Conditions:
Downgrade a system from F5OS-A 1.8.0, F5OS-A-1.8.2, or F5OS-C 1.8.0 to an earlier version, and then attempt to perform a "system database reset-to-default" operation.
Impact:
The system becomes inoperable, with no access to the CLI or UI. Interaction is restricted to a root-level bash login. Following a database reset, access is exclusively available through the serial console.
Workaround:
Perform the below steps for a successful configuration restore or reset-to-default operation following a version downgrade from 1.8.0.
=====================================================================================
F5 rSeries system's config-restore workaround after downgrading from v1.8.0
========================================================================
step-1: Log in to the command line interface (CLI) of the system using an account with root access.
step-2: Copy the below content to a new file f5_dyncfg_config_restor_fix.xml
<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->
<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
<restconf>
<transport>
<tcp>
<enabled>false</enabled>
</tcp>
</transport>
</restconf>
<webui>
<enabled>false</enabled>
<transport>
<tcp>
<enabled>true</enabled>
</tcp>
</transport>
</webui>
</confdConfig>
</config>
<!-- End of file -->
step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/system/
step-4: Execute the below command.
docker exec -it system_manager /confd/bin/confd_load -U -c system -m -l /var/F5/partition/f5_dyncfg_config_restor_fix.xml
step-5: delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml
System Controller’s config-restore workaround after downgrading from v1.8.0
===========================================================================
step-1: Log into the command line interface (CLI) of the Active controller using an account with root access.
step-2: Copy the below content to file f5_dyncfg_config_restor_fix.xml
<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->
<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
<restconf>
<transport>
<tcp>
<enabled>false</enabled>
</tcp>
</transport>
</restconf>
<webui>
<enabled>false</enabled>
<transport>
<tcp>
<enabled>true</enabled>
</tcp>
</transport>
</webui>
</confdConfig>
</config>
<!-- End of file -->
step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/system/
Step-4: Execute the below command.
docker exec -it vcc-confd confd_load -U -c system -m -l /var/F5/system/f5_dyncfg_config_restor_fix.xml
step-5: Delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml
Chassis Partition's config-restore workaround after Partition downgrading from 1.8.0
==================================================================================
step-1: Log in to the command line interface (CLI) of the blade using an account with root access.
step-2: copy the below content to file f5_dyncfg_config_restor_fix.xml
<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->
<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
<restconf>
<transport>
<tcp>
<enabled>false</enabled>
</tcp>
</transport>
</restconf>
<webui>
<enabled>false</enabled>
<transport>
<tcp>
<enabled>true</enabled>
</tcp>
</transport>
</webui>
</confdConfig>
</config>
<!-- End of file -->
step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/partition<id>/
Step-4: Execute the below command.
docker exec -it partition<id>_manager confd_load -U -c system -m -l f5_dyncfg_config_restor_fix.xml
step-5: Delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml
Follow the below steps to fix the system after it enters a failed state following a version downgrade v1.8.0
=====================================================================================
To restore functionality, you must access a bash shell using an account with root access (most likely through the system's serial console) and delete the files in the "/var/F5/system/cdb/" directory and perform a restart. This action will erase all settings, including licensing and the system’s management IP.
Next, get a new license, configure the system management IP address, verify or reset the primary key, and initiate a configuration restoration using the previously saved backup.
If the system controller is reset using this method, the empty partitions must be recovered from backup and the tenants must then be restored.
If a partition experiences this type of failure and is cleared and reset, it must not be deleted or recreated in the system controller. This is because it will result in a mismatch of primary keys and the configuration restoration will not function properly.
1709121-4 : Unable to create a tenant as the Network Manager start-up or failover may result in a looping process
Links to More Info: BT1709121
Component: F5OS-A
Symptoms:
While creating a new tenant, an error occurs:
"Failure for data/f5-tenants:tenants API. The server or an underlying service is unreachable."
The network-manager service seems to hang, or it might be in a restart loop.
In confd, the 'show system mac-allocation state' command indicates that no MAC addresses have been allocated.
$ show system mac-allocation state
system mac-allocation state free-single-macs 16
system mac-allocation state allocated-single-macs 0
system mac-allocation state free-large-blocks 2
system mac-allocation state allocated-large-blocks 0
system mac-allocation state free-medium-blocks 0
system mac-allocation state allocated-medium-blocks 0
system mac-allocation state free-small-blocks 0
system mac-allocation state allocated-small-blocks 0
system mac-allocation state total-free-mac-count 80
system mac-allocation state total-allocated-mac-count 0 <---
system mac-allocation state total-mac-count 80
Conditions:
This can occur with combinations of tenants using MAC blocks greater the size 1. The specific combinations are somewhat unpredictable.
Impact:
Tenants cannot be created.
Workaround:
None
Fix:
The code will be updated to prevent the hang condition.
1702237 : Mismatch between api_svc_gateway auth and zmq_info msg_ids and subset codes
Links to More Info: BT1702237
Component: F5OS-A
Symptoms:
An incorrect msg_id is reported for api_svc_gateway auth or zmq_info errors.
ZMQ_MSG
API_SVC_GATEWAY.ZMQ_MSG.6
Wrong msg_id: 2024-10-29T21:03:59.960602+00:00 appliance-1.chassis.local api-svc-gateway[9]: priority="Info" version=1.0 msgid=0x5806000000000006 msg="Running network manager Message Queue client at" ADDR="tcp://localhost:2401".
Correct msg_id: 2024-10-29T21:03:59.960602+00:00 appliance-1.chassis.local api-svc-gateway[9]: priority="Info" version=1.0 msgid=0x5805000000000006 msg="Running network manager Message Queue client at" ADDR="tcp://localhost:2401".
AUTH
API_SVC_GATEWAY.AUTH.7
Wrong msg_id: 2024-10-29T21:32:15.841424+00:00 appliance-1.chassis.local api-svc-gateway[9]: priority="Err" version=1.0 msgid=0x5805000000000007 msg="Platfrom key could not be decrypted" ERRNOSTR="Bad protocol usage or unexpected retval" LASTERR="Bad ciphertext format" ERRNO=21.
Correct msg_id: 2024-10-29T21:32:15.841424+00:00 appliance-1.chassis.local api-svc-gateway[9]: priority="Err" version=1.0 msgid=0x5806000000000007 msg="Platfrom key could not be decrypted" ERRNOSTR="Bad protocol usage or unexpected retval" LASTERR="Bad ciphertext format" ERRNO=21.
Conditions:
Errors that are logged by api_svc_gateway auth or zmq_info
Impact:
An incorrect message ID is logged.
Workaround:
None
Fix:
Modified api_svc_gateway auth or zmq_info error msg_ids
1701145 : Intermittent redirection to Dashboard when accessing Add/Edit FIPS Partition
Links to More Info: BT1701145
Component: F5OS-A
Symptoms:
In the current session, attempting to navigate to "Add/Edit" screens— such as "Add/Edit FIPS Partition" or "Add/Edit LAG"using the Add button on above its table may unexpectedly redirect to the dashboard. New or other active sessions remain unaffected.
Conditions:
This issue occurs rarely (approximately 1 in 20 to 30 times) when performing the following sequence of actions continuously:
Creating a FIPS partition.
Assigning the partition to a tenant.
Deploying the tenant.
Moving the tenant to the configured state.
Assigning a different FIPS partition to the tenant.
Deploying the tenant.
Impact:
In the affected session, you cannot access "Add/Edit" screens via the Add button and are redirected to the dashboard. However, you can still access these screens by manually navigating to the URL.
Workaround:
This issue is specific to the current session. Starting a new session will resolve the issue.
1694481-2 : K3s token expiry causing tenant unresponsiveness
Links to More Info: BT1694481
Component: F5OS-A
Symptoms:
Expiry of service account token inside multus causes the tenant to become unresponsive.
Note: It will only be impacted if/after it is changed to configured or provisioned and then it is deployed again.
The tenant fails to come up and the tenant status reads:
#show tenants; tenant STATUS
Not ready: containers with unready status: [compute]
Conditions:
-- Multus.kubeconfig is not recreated or updated when the service account token in /var/run/secrets/kubernetes.io/serviceaccount/token is renewed.
-- Even though the token is renewed, the token is still valid for a year in multus.kubeconfig
Impact:
After one year, token in the multus.kubeconfig becomes stale (expired). As a result, when Multus tries to access the Kubernetes API server using the stale token in the multus.kubeconfig, it may fail with authentication errors because the token is no longer valid.
Workaround:
Workaround(1):
Impact of procedure: Performing the following procedure should not have a negative impact on your system.
Delete the multus pod by logging into the system as root and running the following command:
kubectl -n kube-system delete pod -l app=multus
The system will delete the running pod and create a new one. This will refresh the token for the next one year.
Workaround(2):
Impact of procedure: Tenants will be temporarily unavailable during this process.
Rebooting the device will refresh the token.
Fix:
None
1691557-4 : CVE-2020-8037: tcpdump memory leak.
Links to More Info: K000149929
1671629-1 : [rSeries r2000/r4000] After F5OS reboot, tenant interfaces might be in UNINITIALIZED state
Links to More Info: BT1671629
Component: F5OS-A
Symptoms:
- After F5OS reboot, tenant interfaces might be in UNINITIALIZED state.
- Logs from tenant (/var/log/ltm) will show platform_agent receiving blank VLAN names. Example below where vlan id is 1234 (correct) but vlan name is blank (incorrect):
info platform_agent[7810]: 01e10007:6: vlan id = 1234vlan name = interface name = 1.3
Conditions:
- Rebooting F5OS
- rSeries r2000/r4000
Impact:
Traffic disruption. Since tenants interfaces will be UNINITIALIZED, the tenant will not be passing traffic.
Workaround:
- Remove all the VLANs from the interface (where VLAN names are missing) and re-attach the VLANs. This is to be done from F5OS side.
- Rebooting again is also known to resolve the problem (as this is a timing issue on reboot and does not happen frequently)
1644409 : RSeries ATSE v72.40.3.00 firmware
Links to More Info: BT1644409
Component: F5OS-A
Symptoms:
RSeries ATSE v72.40.3.00 firmware
Conditions:
RSeries r5000, r10000, or r12000-series appliance.
This update is not applicable to r2000 or r4000-series appliances.
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes ATSE/BE2 interface stability issues. See ID1596625 for more information.
1644405 : RSeries ATSE v72.4.4.00 firmware
Links to More Info: BT1644405
Component: F5OS-A
Symptoms:
RSeries ATSE v72.4.4.00 firmware
Conditions:
RSeries r5000, r10000, or r12000-series appliance.
This update is not applicable to r2000 or r4000-series appliances.
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes ATSE/BE2 interface stability issues. See ID1596625 for more information.
1644293-4 : Interface status alert and SNMP trap is not sent immediately after interface is disabled
Links to More Info: BT1644293
Component: F5OS-A
Symptoms:
When an interface is disabled, the alert or SNMP trap is not sent immediately.
Conditions:
-- Disable an interface.
Impact:
No alert or SNMP trap is sent when an interface is disabled. The trap is sent when the interface is re-enabled.
Workaround:
None
Fix:
Add a new "Interface disabled" event triggered when an interface is disabled. The "Interface up" and "Interface down" alerts changed to events.
1630273-8 : CVE-2023-4207 - Centos Security Update for kernel
Links to More Info: K000138693
1630253-9 : CVE-2023-4208 - Centos Security Update for kernel
Links to More Info: K000138693
1628557-1 : F5OS high memory usage when using snmp
Links to More Info: K000149820
1624449-4 : SNMP polling of coreTotal5minAvg causing timeouts and genErrors
Links to More Info: BT1624449
Component: F5OS-A
Symptoms:
While running an snmpwalk that includes coreTotal5minAvg, you may get a timeout or a general error:
Timeout: No Response from 10.170.9.16
The general error occurs less frequently:
Error in packet
Reason: (genError) A general failure occured
Conditions:
-- snmpwalk a MIB that includes coreTotal5minAvg
-- The polling is done for CPUs that are not present
Impact:
Error in packet
Reason: (genError) A general failure occurred
Failed object: iso.3.6.1.4.1.12276.1.2.1.1.3.1.6.8.112.108.97.116.102.111.114.109.0
Workaround:
After the system starts, after about two minutes, platform-stats-bridge will log this log message:
msg="DB ready check done" NAME="SnmpCpuStatsHandler".
After that log message, you will be able to check coreTotal5minAvg.
Fix:
Modified code such that snmpwalk will not be executed for offline cpus
1621861-2 : F5OS Upgrade on optics-mgr-package installed device may result in mismatched OS and services★
Links to More Info: BT1621861
Component: F5OS-A
Symptoms:
If the optics-mgr package is installed on the system, performing a Live upgrade may lead to one of the following issues:
The system may continue running an older OS version after the upgrade attempt.
The OS and associated services may fail to upgrade properly.
Conditions:
Performing Live upgrade on a system with optics-mgr installed may result in failure in one of the upgrade steps and continues with the subsequent steps.
Impact:
The system may be completely inoperative, or the system may be running with different OS versions, which could lead to unknown problems.
Workaround:
To prevent the system from entering this state, ensure the following:
If the current OS version is below 1.5.3 and the Optics Manager package is installed, and you are planning to upgrade to version 1.5.3 or 1.8.x, follow these steps:
-> Uninstall the Optics Manager package before starting the upgrade.
-> Proceed with the OS upgrade to version 1.5.3 or 1.8.x.
-> Once the upgrade is complete, reinstall the Optics Manager package.
Note: Installing or uninstalling the optics-manager package triggers a system reboot for the changes to take effect.
1620513-2 : CVE-2024-38477 httpd: NULL pointer dereference in mod_proxy
Links to More Info: K000140784, BT1620513
1620077-1 : FDB entry port motion not working if new interface is a trunk/LAG
Links to More Info: BT1620077
Component: F5OS-A
Symptoms:
Immediately after a fail-over of traffic from one trunk/LAG to another, outbound traffic from the appliance or chassis to certain addresses may be interrupted for up to five minutes before recovering.
Conditions:
Switching traffic from one LAG to another on an appliance or chassis.
Impact:
Temporary disruption of tenant’s outbound traffic on an appliance or chassis system.
Workaround:
None
Fix:
Updated handling of FDB entry port motion to include cases with a trunk/LAG as the new interface.
1618989-1 : CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames
Links to More Info: K000148640
1615917-5 : L2_agent crash due to SNMP★
Links to More Info: BT1615917
Component: F5OS-A
Symptoms:
After upgrading system, L2-agent crashes.
Conditions:
1. System running with older version (earlier then F5OS-C 1.8.0 or F5OS-A 1.8.0 or F5OS-C 1.5.3 )
2. Configure SNMP
3. Upgrade system
4. L2-agent will start crashing.
Impact:
L2-agent crashes and you are unable to do get/set operations for interfaces using ConfD interfaces.
Workaround:
None
Fix:
Fixed an issue causing l2-agent to crash after upgrade.
1614821-4 : CVE-2024-3596 - Blast-RADIUS
Links to More Info: K000141008, BT1614821
1614429-2 : iHealth upload is failing with error "certificate signed by unknown authority"
Links to More Info: K000140362, BT1614429
Component: F5OS-A
Symptoms:
When attempting to use the QKView upload feature, the upload may fail with the message "certificate signed by unknown authority". This is due to a recent change in certificate authority that is inconsistent between F5OS and iHealth.
Conditions:
Always, after mid-July 2024.
Impact:
Unable to upload QKView files to iHealth with a single click.
Workaround:
You can use the File Export feature to download QKView files, and then upload these files to iHealth.
You can find the QKView files in the GUI at System Settings > File Utilities, then choose "diags/shared" as the base directory, then select "qkview".
Fix:
Certificate authorities used by the iHealth upload feature in F5OS will be updated.
1607745-6 : Apache HTTPD vulnerabilities CVE-2024-38476, 2024-38474 and CVE-2024-38475
Links to More Info: K000140618
1598633-6 : CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames
Links to More Info: K000148640
1596625 : BE2 GCI interface training failures during runtime results in failure to process networking traffic★
Links to More Info: BT1596625
Component: F5OS-A
Symptoms:
On particular rSeries appliances, one or more symptoms could occur during normal operation:
-- High availability stops working
-- Inbound traffic stops
-- Platform.log contains 'DM Tx Action ring hung'
This is similar to the symptoms in https://cdn.f5.com/product/bugtracker/ID1580489.html, except that this can be triggered during system operation.
Conditions:
-- rSeries r5000, r10000, or r12000-series appliance
This issue does not affect r2000 or r4000-series appliances.
Impact:
The system stops delivering traffic from front-panel ports to the host, although egress traffic may continue to work. If a LACP LAG is configured, ports will be unable to join the LAG.
Workaround:
There is no workaround for this issue.
If an appliance has already locked up, rebooting it might restore network connectivity.
If your system is running F5OS-A version 1.5.x, F5OS-A-1.5.2-29198.R5R10.EHF-4.iso is an Engineering Hot Fix (EHF) that contains a software fix, and is available at
https://my.f5.com/manage/s/downloads?productFamily=F5OS&productLine=F5OS_Appliance_Software&version=1.5.2&container=1.5.2-EHF
You can also upgrade to F5OS-A 1.8.0.
Fix:
New FPGA bitstreams stabilize the interface between the ATSE and BE2 chip.
1596149-4 : Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures
Links to More Info: BT1596149
Component: F5OS-A
Symptoms:
Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures
Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.
This update is not applicable to r2000 or r4000-series appliances.
Impact:
In cases where errors are detected between the ATSE and BE2 links, alarms and events will be reported.
Workaround:
None
Fix:
Monitor ATSE to BE2 links and raise alarms and report events when errors are detected.
1591645-2 : EPVA related dma-agent crash
Links to More Info: BT1591645
Component: F5OS-A
Symptoms:
A dma-agent seg_fault occurs when there is a conflict between special EPVA allow-list entries.
Conditions:
A conflict between two entries on the allow-list triggers a code path in the dma-agent and resulting in a seg_fault.
Impact:
Traffic loss as the dma-agent needs to be restarted by its watchdog/start up script. Tenants need to re-register with the datapath.
Workaround:
None
Fix:
This issue has been fixed by setting a THREAD local variable in the epva_tbl_mgmt thread, preventing a seg_fault when the edge case method is triggered.
1587837-4 : Memory leak in multiple components
Links to More Info: BT1587837
Component: F5OS-A
Symptoms:
A mishandling of memory allocation in the data provider callback library can cause memory allocation to grow over time. This memory usage growth can cause poor performance and the Out Of Memory (OOM) killer may kill components, causing outages.
Conditions:
If a data provider processes overlapping requests it can leak memory. The components most affected by this are the platform-stats, snmp-service, an L2 agent.
Impact:
Components may crash or get killed.
Workaround:
Monitor memory usage and periodically restart daemons that experience excessive memory growth. On a chassis system, a manual failover and the rebooting the standby controller will restart all daemons.
To minimize the occurrence of this leak, do not constantly poll for statistics, especially from multiple monitoring stations.
Fix:
The library has been fixed to no longer leak session data.
1585765-1 : Error message IDs for appliance-orchestration-manager are incorrect
Links to More Info: BT1585765
Component: F5OS-A
Symptoms:
The error message IDs found on a running system differ from the error message IDs found in the F5OS error catalog.
Conditions:
No specific conditions in the configuration of the system caused this issue.
Impact:
Makes it difficult to find the right information in the F5OS error catalog.
Workaround:
None
Fix:
This issue has been fixed and the error IDs now have the correct values in both the running system and the F5OS error catalog.
1579289-1 : Empty log message when interface changes state
Links to More Info: BT1579289
Component: F5OS-A
Symptoms:
An empty log message is logged:
appliance-1 nic-manager[1]: priority="Info" version=1.0 <msgid=> msg="Updating interface link state" <ifname=> <state=>. >>>>
The empty log message is reported after an interface oper-status changes from either UP/DOWN or DOWN/UP state
Conditions:
An interface is enabled or disabled in F5OS
Impact:
The log message does not report which interface's state changed.
Workaround:
None
Fix:
With the appropriate fix, the empty log is no longer reported
1577049-4 : CVE-2024-1086 - Linux kernel vulnerability
Links to More Info: K000139430, BT1577049
1575417-1 : Platform-diag-agent memory leak
Links to More Info: BT1575417
Component: F5OS-A
Symptoms:
Memory usage for the "platform-diag-agent" process may steadily increase over time.
Conditions:
This can happen when frequently requesting “system health components” from ConfD.
Impact:
The system may eventually run out of memory and affect all services on the system.
Workaround:
None
Fix:
Memory leak fixed. Consider reducing the request frequency. The system can also be rebooted to temporarily restore memory usage to normal levels.
1566569 : Unable to access rSeries system from 172.17.0.0/16 IP subnet
Links to More Info: BT1566569
Component: F5OS-A
Symptoms:
Unable to access the rSeries system from client or server systems in the 172.17.0.0/16 IP subnet
Conditions:
-- r5000-series, r10000-series, or r12000-series appliance
Impact:
Unable to access the rSeries system from client or server systems in the 172.17.0.0/16 IP subnet
Workaround:
To work around this issue, do the following:
1. Log into the system as root
2. If running F5OS-A 1.7.0, edit /var/docker/config/platform.yml. If running F5OS-A 1.5.2, edit /var/docker/config/platform.patch.yml.
3. In the specified file, locate the section for "selinux_labeler", and add a line under it that reads 'network_mode: "none"'. The indentation of this line must match exactly the indentation of the "container_name" and "image" lines.
For example:
selinux_labeler:
container_name: selinux_labeler
network_mode: "none"
image: ${...
...
4. Reboot the system.
5. Once the system is rebooted, log into the system as root, and run "docker network rm config_default"
1558797-1 : BMC self health test falsely logged as failed
Links to More Info: BT1558797
Component: F5OS-A
Symptoms:
The BMC self health test is randomly logged as having failed:
appliance-1 alert-service[8]: priority="Notice" version=1.0 msgid=0x2201000000000029 msg="Received event." event="65543 appliance aom-fault EVENT NA "Bmc Health Self test failed: Device-specific 'internal' failure." "2024-03-01 14:00:00.918553424 UTC"".
Conditions:
Checking the platform log
Impact:
BMC self health test is falsely logged as failed.
Workaround:
None
Fix:
This issue has been fixed and the BMC self health test no longer falsely logs a failure.
1497657-4 : First SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges
Links to More Info: BT1497657
Component: F5OS-A
Symptoms:
The first SSH login after editing role-based privileges for a remote RADIUS or TACACS+ user will still give the user their prior privileges (or, if the user is newly created, login will be rejected with a message saying "This account is currently not available"). Subsequent logins will apply the updated user privileges.
Conditions:
1. RADIUS or TACACS+ Authentication is enabled.
2. A new user is created in one of the above auth systems, or an existing user’s role-based access is modified.
3. The affected user SSHs into F5OS for the first time after the change in step #2.
Impact:
First login to system after creation fails, or first login after modification of user privileges gives the user incorrect privileges.
Workaround:
None
Fix:
Fix issue where first SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges.
1496977-1 : Remote GID mappings to F5OS roles are disconnected for TACACS+/RADIUS authentication methods.
Links to More Info: BT1496977
Component: F5OS-A
Symptoms:
Remote GID mappings (on a TACACS+ or RADIUS server) to F5OS GIDs/roles are not working correctly. When attempting to configure a remote mapping, it results in the access rejection with a message similar to below:
[root@system ~]# ssh radius_or_tacacs_user@<F5OS system mgmt IP>
Password:
Last login: <date> from <source IP>
No valid role group found in user groups: '9000'
Connection to <mgmt IP> closed.
Conditions:
A remote GID mapping is configured for a role in F5OS and the authentication method used for remote users is RADIUS or TACACS+.
Impact:
Remote users cannot log in to the system.
Workaround:
Configure remote user's GIDs in a way that they correspond to the GIDs in F5OS for the desired role(s). Then, remove any remote GID mappings in the F5OS configuration.
Fix:
Fixed remote GID mapping to F5OS roles for TACACS+/RADIUS authentication methods.
1496837 : User-manager's ConfD socket getting closed.
Links to More Info: BT1496837
Component: F5OS-A
Symptoms:
After repeating the change of network type and device reboot, the device goes into a state where the user-manager is not interacting with ConfD.
Conditions:
- Change remote GID role and check '/etc/gid-map.txt' file if the value is reflected.
- Switch network type and reboot the device.
Repeat the above process until '/etc/gid-map.txt' file is not been updated correctly.
Impact:
Any ConfD configuration change that goes through user-manager fails. This includes any of the user’s password changes, or remote GID changes.
Workaround:
Rebooting the system will get the correct GID value from the ConfD and update the '/etc/gid-map.txt' file.
Fix:
The user-manager has no reason to use NSS to lookup any PW/group info, as it deals exclusively with the local user database.
Additionally, there is a ZMQ service that belongs in authentication-mgr (which understands remote authentication) that is in the user-manager container. It forces user-manager to use an ‘/etc/resolv.conf’ that can reference remote sources.
If the user-manager trips over a lookup that goes to LDAP (usually a local-db miss), it can be very slow and time out. The ConfD->user-manager channel is sensitive of slow responses, and shuts down subscriber/callpoint handler/daemon that takes over 15 to 30 seconds to respond. When this happens, the user-manager is going to see an EOF on its ConfD sockets.
This fix forces the user-manager to only lookup on local databases.
1495337-2 : FIPS Password Initialization Failure with Special Characters
Links to More Info: K000154661
1492621 : Config-restore fails when backup file has expiry-status field for admin or root user
Links to More Info: BT1492621
Component: F5OS-A
Symptoms:
For a root or admin user, if the value for Expiry-status in the backup file is not set to enabled, then config-restore fails.
Conditions:
During backup, if the "Expiry-status" value for admin or root user is not set to enabled, then restore fails with the backup.
Impact:
Database config-restore fails.
Workaround:
For admin and root user, comment expiry-status, expiry-date in the backup file and try to restore.
Fix:
Added NACM rules in ConfD for successful config-restore.
1490753-1 : A linkUp and linkDown traps are sent when an up interface is disabled, and vice versa
Links to More Info: BT1490753
Component: F5OS-A
Symptoms:
When F5OS system is configured with SNMP Targets for managing the Trap notifications, linkUp and linkDown traps will be sent when interface state is toggled.
Conditions:
Always two traps (linkUp and linkDown) will be sent even when the interface state is toggled from UP to DOWN or DOWN to UP.
Impact:
No functional impact, but when two traps are sent, the interface state over SNMP can be misleading.
Workaround:
None
Fix:
The appropriate trap, that is, linkDown trap when F5OS interface state is down and linkUp trap when F5OS interface state is up, will be sent.
1486697-1 : Configuring Expiry-status of root and admin users should not be allowed
Links to More Info: BT1486697
Component: F5OS-A
Symptoms:
Expiry-status of root and admin users are allowed to be configured and there is a chance of locking out these users.
Conditions:
If Expiry-status of any root or admin user is marked as Locked, that root or admin user cannot log in to the system.
Impact:
There is a chance that default users, such as root and admin, become locked out.
Workaround:
None
Fix:
You cannot edit the ‘Expiry-status’ field in webUI for admin and root users. Thus, it cannot be configured. The 'Expiry-status' field for root and admin users will now always display the default value as 'Enabled'.
1469925-1 : Timezone changes are not reflected in the log messages until the hardware is rebooted
Links to More Info: BT1469925
Component: F5OS-A
Symptoms:
After configuring timezone, /var/log/messages are logged with old timezone till the hardware is rebooted.
Conditions:
Configure timezone from ConfD and verify /var/log/message.
Impact:
The log messages are logged with old timezone.
Workaround:
After configuring timezone, rebooting the hardware resolves the issue.
Fix:
Added code changes to reflect the new timezone changes in /var/log/messages without rebooting the hardware.
1469385-1 : GUI freezes during LDAP user authentication if no remote GID mapped locally.
Links to More Info: BT1469385
Component: F5OS-A
Symptoms:
The LDAP remote user authentication freezes for a long time (more than a minute).
Conditions:
When trying to authenticate a remote LDAP user through the GUI without mapping any of the remote user GIDs to the F5OS local roles.
Impact:
Authentication freezes for a long period before rejecting the user.
Workaround:
One of the remote GIDs should be mapped to the local F5OS roles.
Fix:
Map the remote GID(s) to the F5OS role(s) to authenticate remote LDAP users successfully.
1466397-2 : LDAP authentication is consuming several minutes to authenticate via GUI and SSH.
Links to More Info: BT1466397
Component: F5OS-A
Symptoms:
LDAP authentication is working fine. However, authentication takes several minutes, which lacks a user-friendly experience.
Conditions:
- Configure LDAP server-group.
- Configure LDAP_ALL as an authentication-method.
- Log in using LDAP user via GUI or SSH.
Impact:
The user is forced to wait for several minutes to get the result of LDAP authentication.
Workaround:
None
Fix:
Removed unnecessary GID lookup to speed up LDAP authentication.
1441505 : iHealth upload client may fail if ConfD database is offline.
Links to More Info: BT1441505
Component: F5OS-A
Symptoms:
If the ConfD service goes offline when migrating primary key, executing the iHealth upload commands (for example, show system diagnostics ihealth), and in the event of performing any other activity, then the iHealth service may generate a core file.
Conditions:
If the ConfD service goes offline when migrating primary key, executing the iHealth upload commands (for example, show system diagnostics ihealth), and in the event of performing any other activity, then the iHealth service may generate a core file.
Impact:
A core file may be generated.
Workaround:
The iHealth client will restart if it cores. Repeat the iHealth commands after the ConfD database is up and running.
Fix:
Hardening is added in the iHealth client to avoid generating a core file in certain events.
1441425-1 : The rSeries appliance log shows "PSU voltage out value < lower limit, value=0".
Links to More Info: BT1441425
Component: F5OS-A
Symptoms:
The following message appears in the logs:
66305 psu-1 psu-fault EVENT Network Access "PSU voltage out value < lower limit, value=0" "2023-12-08 09:00:00.900082135 UTC".
Conditions:
The conditions that trigger this issue are unknown at this time.
Impact:
Users see several "PSU voltage out value < lower limit, value=0" logged messages, which could be falsely reported.
Workaround:
None
Fix:
None
1441333-1 : Rasdaemon memory leak
Links to More Info: BT1441333
Component: F5OS-A
Symptoms:
Rasdaemon will increase in size when excessive (>10000) MCE memory error events occur and may lead to system instability.
Conditions:
Likely due to memory hardware resulting in MCE errors
Impact:
System instability
Workaround:
Rebooting could be a temporary work-around if MCE rate is excessive.
Fix:
Rasdaemon version is upgraded in the current F5OS release.
1437765 : Restoration of system configuration database may fail if admin user was previously modified
Links to More Info: BT1437765
Component: F5OS-A
Symptoms:
The restoration of the System Configuration Database fails with this error:
appliance-1(config)# system database config-restore name config_database1 proceed yes
Error: access denied
Database config-restore failed.
Conditions:
In F5OS-A 1.5.1, the expiry status of the ‘admin’ user has been modified even before the System Configuration Database is saved and restored on the device that is currently installed after RMA/factory or F5OS clean install.
Impact:
Unable to restore the System Configuration Database.
Workaround:
1. In F5OS-A 1.5.1, it is recommended not to lock or modify the expiry status of the ‘admin’ user on the RMA/factory or clean installed appliance. If modified, enable the user before taking the backup.
2. Edit the System Configuration Database backup file. For the admin and root user, remove the next line which is highlighted by the arrow, then restore the configuration using the modified file:
<username>admin</username>
<config>
<username>admin</username>
<password><REMOVED></password>
<last-change>0</last-change>
<expiry-date>-1</expiry-date>
<role>admin</role>
<expiry-status>enabled</expiry-status> <---
1436373 : iHealth upload not supported on F5OS-A
Links to More Info: BT1436373
Component: F5OS-A
Symptoms:
The iHealth upload service has changed its authentication schema to OKTA, and requires a Client ID and Client Secret rather than a User ID and Password. Version 1.5.1 (and previous versions) of F5OS-A do not support this authentication schema.
Conditions:
Always
Impact:
Users will not be able to directly upload QKView files to iHealth from the appliance because of change in the authentication schema.
Workaround:
1. Use the file export feature to download the QKView from the appliance to a local PC.
2. Sign on to ihealth.f5.com.
3. Use the upload feature to upload the QKView to the iHealth service.
Fix:
Added Client ID and Client Secret in the iHealth page on webUI. User can upload QKView files to iHealth.
1436153-1 : F5OS upgrades fail when SNMP configuration contains special characters.
Links to More Info: BT1436153
Component: F5OS-A
Symptoms:
As part of some security fixes, added a special character restriction in SNMP configuration in F5OS-A 1.5.1. This resulted in an upgrade failure to 1.5.1. If an upgrade to 1.5.1 is successful, the SNMP configuration will get deleted implicitly.
Conditions:
Upgrade to 1.5.1 fails when the SNMP configuration contains any special characters. The restricted special characters are: /*!<>^,/
Impact:
If the user encounters this issue, the system will go to an inaccessible state and require a forced downgrade.
Workaround:
Delete the SNMP configuration (community, target, or user) containing special characters before performing an upgrade to 1.5.1.
Fix:
The special characters in the SNMP configuration do not inject any security issues and can have special characters. Hence, the special characters restriction is removed in F5OS-A 1.5.2 and F5OS-A 1.8.0.
1429721-1 : SCP as non-root user does not report errors correctly for bad/non-existent files.
Links to More Info: BT1429721
Component: F5OS-A
Symptoms:
Using SCP to retrieve files from F5OS as "admin" or other non-root users should report a proper error when attempting to access an invalid directory or non-existent file.
Instead, the SCP command does nothing, reports no error, and exits with an on-zero exit status.
Conditions:
Attempt to read a non-existent/inaccessible file via SCP.
Impact:
The user is not informed about the failed SCP operation and the reason for the failure.
Fix:
SCP server software now reports errors the invalid/inaccessible filenames.
1397145-2 : Unable to add blade to Openshift cluster if VELOS partition root password is expired or locked
Links to More Info: BT1397145
Component: F5OS-A
Symptoms:
If a VELOS partition root password is expired or locked, the system may be unable to add the blade to the Openshift cluster (or manage the cluster).
The "show cluster" command output will report that a blade is reachable ("able to ping"), but will not be able to connect to it ("able to SSH"):
ABLE ABLE
IN READY TO TO PARTITION
INDEX NAME INSERTED CLUSTER CLUSTER PING SSH STATE LABEL
--------------------------------------------------------------------------------------------------
1 blade-1.chassis.local true false false true false Not In Cluster
2 blade-2.chassis.local true false false true false Not In Cluster
3 blade-3.chassis.local true false false true false Not In Cluster
Conditions:
-- VELOS partition
-- root account in partition is expired or locked
Impact:
- Blade will not join Openshift cluster.
- Unable to deploy Tenants to blade.
Workaround:
Re-enable the root user account for the partition:
system aaa authentication users user root config expiry-status enabled
1393269-1 : Error log: "PINGLOOP Failed to ssh to 127.0.0.1"
Links to More Info: BT1393269
Component: F5OS-A
Symptoms:
"PINGLOOP Failed to ssh to 127.0.0.1" logged in platform.log by Appliance Orchestration Manager.
Conditions:
1. root user locked with expiry status set to "locked".
2. Appliance rebooted after locking root user.
Impact:
Internal processes relying on root user may malfunction.
Workaround:
Avoid locking the root user account by not setting the expiry status to "locked".
Use appliance mode for root user lockdown.
1388945-1 : Fan speed randomly shows as '0'.
Links to More Info: BT1388945
Component: F5OS-A
Symptoms:
The fan speed is randomly and incorrectly reported as '0'.
Conditions:
Checking the sensors using GET:bmc/sensors.
Impact:
The fan speed is reported as '0'.
Workaround:
None
Fix:
This issue has been fixed, and the fan speed no longer randomly reports as '0'.
1388745-1 : Large numbers of platform-hal errors logged in platform.log: "Requested Sensor, data, or record not present."
Links to More Info: BT1388745
Component: F5OS-A
Symptoms:
The platform-hal service is intermittently logging a large number of messages similar to the following in platform.log:
appliance-1 platform-hal[8]: priority="Err" msg="Action Error" index=0 message="Requested Sensor, data, or record not present." interface="job-665402" actionKey="GET:lop/pel" jobId=665402
There may be tens of thousands of log messages in some cases.
Conditions:
The conditions that trigger this issue are unknown at this time.
Impact:
The platform.log file becomes filled up with many of these log messages, and they must be filtered out to review the logs effectively.
Workaround:
None
Fix:
None
1388477-2 : Default GID group mapping authorized even when GID mapped to different group ID
Links to More Info: K000139503, BT1388477
1381225-5 : CVE-2023-39325 - HTTP/2 rapid reset
Links to More Info: K000152389
1381205-4 : CVE-2023-39325 - HTTP/2 rapid reset
Links to More Info: K000152389
1381177-3 : CVE-2023-39325 - HTTP/2 rapid reset
Links to More Info: K000152389
1381109-2 : WS-2022-0322 - d3-color 2.0.0 package
Component: F5OS-A
Symptoms:
Versions of d3-color prior to 3.1.0 are vulnerable to a Regular expression Denial of Service.
Conditions:
N/A
Impact:
F5OS-A 1.8.0 may be affected by WS-2022-0322
Workaround:
N/A
Fix:
d3-color has been upgraded to an unaffected version.
1379845-1 : CVE-2023-3341:bind: stack exhaustion in control channel code may lead to DoS
Links to More Info: K000137582, BT1379845
1379625-4 : Changing the max-age attribute in password policy is not reflecting immediately
Links to More Info: BT1379625
Component: F5OS-A
Symptoms:
Even after setting max-age value (maximum age, in days, after which password will be expired) less than 7 days, the warning for password expiration is not displaying at the time of next login.
Conditions:
Set max-age attribute to less than 7 (days) and check if password expiration warning is prompted at the time of next login.
Impact:
Password expiration feature is not working as expected.
Workaround:
N/A
Fix:
Fix is provided to sync the max-age value, updated from ConfD CLI, with the user's password expiration attribute in the /etc/shadow on the system.
1378805-4 : Error occurs when changing LAG type for an existing LAG interface on webUI
Links to More Info: BT1378805
Component: F5OS-A
Symptoms:
On the webUI, if a LAG type changes from LACP, an error displays when that LAG type changes back to LACP.
Conditions:
The error occurs when attempting to change the LAG type on an existing LAG interface to a previously used type.
(i.e. Creating a LAG interface with type LACP, changing that type to Static, and then changing it back to LACP)
Impact:
This issue does not affect functionality; however, an unnecessary "Object Already Exist" error pop-up appears.
Workaround:
To avoid the pop-up, change the LAG type to LACP using the CLI in this scenario.
Fix:
Changing the LAG type on an existing LAG interface to a previously used type no longer triggers an error pop-up on the webUI.
1378313-3 : CVE-2020-22218: libssh2: use-of-uninitialized-value in _libssh2_transport_read
Links to More Info: K000138219, BT1378313
1366337-2 : Adding a system raid drive fails after successful removal
Links to More Info: BT1366337
Component: F5OS-A
Symptoms:
If the system is set up using bare-metal installation of F5OS-A 1.5.1, the user will not be able to add a SSD after removing an existing SSD from RAID.
Conditions:
The system must have been bare-metal installed using F5OS-A 1.5.1.
Impact:
User is unable to remove/add SSD into RAID.
Workaround:
N/A
Fix:
SSD can be added and removed from RAID.
1365985-2 : GID role mapping may not work with secondary GID
Links to More Info: BT1365985
Component: F5OS-A
Symptoms:
When a user in an external authentication system (LDAP, Radius, TACACS) is given a GID for an F5 role, and that GID is a secondary GID, the role assignment may not be discovered. This would result in the inability to access the system or be able to configure the system for that user.
Conditions:
- User in an external authentication system (LDAP, Radius, TACACS)
- GID corresponding to F5 role is a secondary GID (for example, it is not the user's default GID, rather a GID from a group to which the user belongs)
Impact:
Inability to log into the system, or inability to configure the system for the user in question.
Workaround:
The GID for the desired role should be the GID directly mapped to the user in the external authentication system (for example, in LDAP, the gidNumber on the user object should be the F5 role GID), rather than a secondary GID (for example, in LDAP, the gidNumber on a group of which the user is a member).
Fix:
All GID role mappings are properly considered when discovering role assignments for users in external authentication systems.
1365821-2 : Traffic loss of 5-10 seconds after disable/enable of LACP Lag member on r5000/r10000
Links to More Info: BT1365821
Component: F5OS-A
Symptoms:
Disabling and then re-enabling a LACP Lag member can result in traffic loss of up to 10 seconds on r5000/r10000 platforms.
Conditions:
Disable then re-enable LACP Lag member on r5000/r10000 platforms.
Impact:
Traffic loss lasting up to 10 seconds.
Workaround:
N/A
Fix:
Don't hold a mutex while processing the set of links to initialize. Make a copy of the links and release the mutex instead.
1360905-3 : Unexpected log messages in /var/log/boot.log post-integrity recovery
Links to More Info: BT1360905
Component: F5OS-A
Symptoms:
Users may observe the following inappropriate log message in /var/log/boot.log after recovering from integrity failure:
Sep 28 08:45:08 appliance-1 journal: FIPS Integrity Check: This system has been placed in an error state. Try to recover the system using /usr/libexec/ostree_recover utility or reinstall the system. On many devices pressing the escape key followed by '(' key will bring up a menu that allows the system to be restarted.
Conditions:
The integrity failure occurs when the device is in FIPS mode, and a user alters or removes a file, subsequently executing an on-demand integrity test or a boot-up integrity test.
Impact:
There are no noticeable performance issues or anomalies associated with these log messages, and the issue does not affect the overall system performance or user experience. There are no potential risks or security concerns related to the inappropriate log messages.
Workaround:
N/A
Fix:
The code has been modified to provide more user-friendly log messages.
1359897-2 : rSeries link down events can be missed
Links to More Info: BT1359897
Component: F5OS-A
Symptoms:
The rSeries platform can occasionally fail to detect a link going down due to the removal of the cable.
Conditions:
Remove fiber optic cable.
Impact:
Links that are DOWN stay operationally UP. This can lead to erroneous LACP and/or LAG state.
1355277-4 : Incorrect Vlan Listeners when a Static FDB is configured
Links to More Info: BT1355277
Component: F5OS-A
Symptoms:
When a Static FDB is configured on an interface, Vlan Listeners associated with that interface will have an extra Service ID configured for Service ID 1.
Conditions:
A Static FDB is configured on an interface.
Impact:
Extra broadcast traffic will be generated on the system, which could affect performance.
Workaround:
N/A
Fix:
N/A
1354341-3 : Changing a VLAN from trunked (tagged) to native (untagged) on a LAG in a single transaction can cause traffic outage
Links to More Info: BT1354341
Component: F5OS-A
Symptoms:
Traffic outage after changing a VLAN assigned to a LAG from Trunk to Native in a single commit.
Conditions:
Changing a VLAN assigned to a LAG from Trunk to Native in a single commit.
Impact:
Traffic outage.
Workaround:
First remove the Trunk VLAN from the LAG, then commit the change. Then add the Native VLAN to the LAG and commit the change.
1352449-7 : iHealth upload is failing with error "certificate signed by unknown authority"
Links to More Info: BT1352449
Component: F5OS-A
Symptoms:
When attempting to use the QKView upload feature, the upload may fail with the message "certificate signed by unknown authority". This is due to a recent change in certificate authority that is inconsistent between F5OS and iHealth.
Conditions:
Always, after mid-September 2023.
Impact:
Unable to upload QKView files to iHealth with a single click.
Workaround:
Users may use the File Export feature to download QKView files to their PCs, and then upload those files to iHealth.
You can find the qkview files in the GUI at System Settings :: File Utilities, then choose "diags/shared" as the base directory, then select "qkview".
Fix:
Certificate authorities used by the iHealth upload feature in F5OS will be updated.
1352421-2 : L2 services (LACP/LLDP) are down on r2000 and r4000 series appliances
Links to More Info: BT1352421
Component: F5OS-A
Symptoms:
LLDP and LACP will appear to be non-functional on the F5OS system.
LLDP/LACP PDUs reach the F5OS system, which can be verified with tcpdump.
Conditions:
-- r2000 and r4000 series appliances.
-- LLDP or LACP is configured.
-- Links are up.
Impact:
L2 protocols fail to negotiate or register inbound data.
Workaround:
Reboot.
1351529-2 : Fixing the log issue stating "UNSUPPORTED STP state" when STP global is configured
Links to More Info: BT1351529
Component: F5OS-A
Symptoms:
A log message appears, stating "UNSUPPORTED STP state" when STP global is configured to RSTP.
Conditions:
Removing the global config (initially set to STP) and setting it to RSTP.
Impact:
Reliable and correct log messages.
Workaround:
NA
1349465-4 : Partition s/w upgrade compatibility check doesn't use correct target version
Links to More Info: BT1349465
Component: F5OS-A
Symptoms:
When performing the partition database compatibility upgrade check (check-version/set-version), the check logic does not always use the correct target version. This potentially can cause the compatibility check to pass, but the actual database upgrade can fail and automatically roll back.
Conditions:
When the target partition version is a patch release (such as 1.5.1, 1.6.1), the compatibility check will use the wrong (base release) version.
Impact:
The check-version/set-version database compatibility check might pass even though the actual upgrade would fail.
Workaround:
Upgrade the controller s/w to version F5OS-C 1.6.1 or later prior to attempting upgrade to a partition patch release.
Fix:
The controller OS services uses the correct partition patch version for the compatibility check.
1348297-4 : CVE-2020-15113, CVE-2020-15114, CVE-2020-15115 - etcd Vulnerabilities
Component: F5OS-A
Symptoms:
CVE-2020-15113: A flaw was found in etcd where Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.
CVE-2020-15114: A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.
CVE-2020-15115: A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users' passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.
Conditions:
NA
Impact:
May lead to unauthorized system access, bypass of security mechanisms, or denial of service.
Workaround:
NA
Fix:
Removed unused etcd packages from F5OS
1348189-4 : CVE-2020-13790 libjpeg-turbo: heap-based buffer over-read in get_rgb_row() in rdppm.c
Component: F5OS-A
Symptoms:
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
Conditions:
N/A
Impact:
It can cause heap buffer over-read leading to crashes, denial of service, or potential information disclosure
Workaround:
N/A
Fix:
heap buffer over-read has been resolved
1338521-2 : Unable to login when accessing F5OS GUI through a network proxy on a port other than 443.
Links to More Info: BT1338521
Component: F5OS-A
Symptoms:
Users are not able to log in to the UI when trying to access F5OS GUI through a network proxy running on a port other than 443.
Conditions:
GUI should be accessed via a network proxy running on a port other than 443.
Impact:
Users are not able to log in to the GUI.
Workaround:
None
Fix:
After the fix, GUI now reads the port along with the hostname from the URL and can use the port in making API calls (including login API calls).
1332997-2 : Device stuck at "unmounting containers" after performing reboot
Links to More Info: BT1332997
Component: F5OS-A
Symptoms:
When we open the console session of any tenant on F5OS-A using virtctl console <tenant_name>.
when you reboot the system, during reboot sometimes the system might end up in "unmounting containers"
Conditions:
Open the console session to any of the tenants using virtctl utility and reboot the system.
Impact:
After rebooting, system takes time to fully start up.
Workaround:
Power off and on the system whenever the issue is hit.
Fix:
Fixed the issue related to device stuck at unmounting containers after the reboot.
1332781-4 : A remote user with the same username as the local F5OS user will be granted the local user's roles
Links to More Info: BT1332781
Component: F5OS-A
Symptoms:
If you create a remote user on the RADIUS, TACACS+, or LDAP servers with the same username as a local F5OS user, the remote user will be granted the local user's roles upon authentication.
Conditions:
A remote user is created with the same username as a local user and remote authentication is enabled.
Impact:
Remote user will take the local user's privileges.
Workaround:
Do not create a remote user with the same username as the local user. If you have created already, change the username for either the local user or the remote user.
Fix:
If a remote user is created with the same username as a local user, the remote user's authentication will be rejected. Only the local user will have access to the F5OS system.
1330717-2 : LLDP neighbors are not getting discovered
Links to More Info: BT1330717
Component: F5OS-A
Symptoms:
When a user configures LLDP at one time, the LLDP details will not show up.
Conditions:
Configure LLDP interfaces at one time.
Impact:
The "show lldp" command will not show neighbor details even if the interfaces/ports are connected to a peer switch.
Workaround:
The issue arises when all LLDP interfaces are configured at one time. However, if the LLDP interfaces are disabled and then enabled one by one, the issue is generally not observed.
Fix:
Fixed an issue with LLDP neighbors not getting discovered
1329161-3 : In non-FIPS mode, added support for the SSH-RSA host key algorithm
Links to More Info: BT1329161
Component: F5OS-A
Symptoms:
Not able to establish an SSH connection using the SSH-RSA host key algorithm in non-FIPS mode.
Conditions:
Connect to the device from the SSH client using the SSH-RSA host key algorithm in non-FIPS mode.
Impact:
The SSH connection to the device could not be established.
Workaround:
None
Fix:
Added SSH-RSA host key algorithm support in non-FIPS mode.
1328977-1 : Appliance_orchestration_manager free invalid pointer error and restart
Links to More Info: BT1328977
Component: F5OS-A
Symptoms:
Appliance Orchestration Manager fails, leading to a restart of the docker container. A core can also occur.
In /var/log/messages you see this log:
appliance-1 omd_container.sh: *** Error in `/usr/bin/appliance_orchestration_manager': free(): invalid pointer: 0x00007facdc017f10 ***
Conditions:
There are no preconditions. It is happening to memory corruption in the systems. The issue is not consistent.
Impact:
OMD restarts; this will not generally disturb the tenant's functionality.
Workaround:
None
Fix:
Fixed the issues related to memory corruptions in the appliance Orchestration Manager.
1328729 : Slow memory leak when processing tenant telemetry
Links to More Info: BT1328729
Component: F5OS-A
Symptoms:
The system will eventually run out of memory. Up until the point of service restart, the memory utilization will negatively impact running tenants, causing potential memory allocation errors.
Conditions:
When a BIG-IP tenant version </= 15.1.7 is running.
Impact:
Excessive memory utilization will impact operational performance of the F5OS and tenants.
Workaround:
The mitigation is to update a BIG-IP tenant version to 15.1.8 or newer, or to update to F5OS 1.5.1.
1328405-2 : F5OS system stopped generating tmstat snapshots
Links to More Info: BT1328405
Component: F5OS-A
Symptoms:
The F5OS system is not generating the tmstat snapshots, which helps us in diagnosing issues.
Conditions:
System is running an affected version of F5OS software (F5OS-A 1.2.0 and above, or F5OS-C 1.6.0 and above).
Impact:
Impacts the supportability of the device; the support teams usually rely on the snapshots while working on field issues.
1327701-4 : Space in SNMP community/user/target name causing snmpd container restart
Links to More Info: BT1327701
Component: F5OS-A
Symptoms:
When there is a space in any SNMP community/user/target name configuration, this will cause an F5OS snmpd service restart.
Conditions:
When there is a space in an SNMP community/user/target name configuration.
Impact:
F5OS snmpd restarts.
Workaround:
Reconfigure the SNMP community/user/target without a space in the name.
Fix:
Added a space restriction in SNMP community/user/target name configuration so the user can no longer configure with a space.
1327689-2 : Manually remove root and user keys before entering Appliance Mode
Links to More Info: K000140574, BT1327689
1327137-1 : Interfaces take longer than expected to come up
Links to More Info: K000138753, BT1327137
Component: F5OS-A
Symptoms:
-- Interfaces take longer than expected to be marked UP (40+ seconds)
-- LACP status remains down until the interfaces are marked UP
Conditions:
-- rSeries appliance
-- F5OS-A
-- 100G interfaces
Impact:
For SFP/QSFP interfaces:
-- 25G/10G interfaces take over 10 seconds to be marked UP
-- 100G interfaces take 30+ seconds to be marked UP.
Workaround:
None
1326837 : Using UI, unable to configure the account expiry date for the user as the request is not delivered to the backend.
Links to More Info: BT1326837
Component: F5OS-A
Symptoms:
Even if the user account is locked using GUI, the authentication is successful for the current user account.
Conditions:
Unable to configure the locking of a user account in the backend.
Impact:
The user account is not locked thus enabling successful authentication.
Workaround:
Added expiry-status to ConfD and UI to define an expiry date for a specific user account with "enabled", "locked", or <string>[YYYY-MM-DD] value.
Or Add expiry-status in ConfD instead of UI to configure expiry of any user account except Admin or Root user account.
Fix:
Added expiry-status to configure expiry of any user account.
1326725-4 : Unable to generate SNMP Trap for IPV6
Links to More Info: BT1326725
Component: F5OS-A
Symptoms:
Generating SNMP traps for IPv6 is not working.
Conditions:
1. Configure SNMP traps for an IPv6 address:
appliance-1# show system snmp
system snmp engine-id state engine-id 80:00:2f:f4:03:00:94:a1:38:33:02
system snmp engine-id state type mac
system snmp state port 5000
system snmp targets target v1_target
state name v1_target
state community c1
state security-model v1
state ipv6 address 2620:128:e8:49:f816:3eff:fe9:248e
state ipv6 port 5011
SECURITY
NAME NAME MODEL
----------------------
c1 c1 [ v1 ]
2. Try to collect SNMP traps on targeted system:
[root@testvm ~]# snmptrapd -Lof 2620:128:e008:4009:f816:3eff:fe09:248e:5011
NET-SNMP version 5.7.2
Impact:
SNMP traps for IPv6 addresses won't work.
Workaround:
N/A
Fix:
We corrected the code for generating SNMP traps for IPv6 addresses.
1326541-2 : In r2000 and r4000 systems, alarm LED is not set when there are alerts raised in the system
Links to More Info: BT1326541
Component: F5OS-A
Symptoms:
When system has any alarm, alarm LED will not be set, and diag-agent is not clearing all the alarms during the boot up.
Conditions:
Applicable for r2000 and r4000 systems.
Impact:
Alarm LED will not be set when system generates any alarm, and diag-agent will not clear all the alarms during the boot up.
Workaround:
When system generates alarms, they can be seen using ConfD.
Fix:
When system generates any alarm, alarm LED will be set and diag-agent will clear all the alarms while during the system boot up.
1326157-2 : Observed multiple containers restarting and cores generating after PXE installation
Links to More Info: BT1326157
Component: F5OS-A
Symptoms:
As a result of "permission denied" errors, some containers begin crashing after a PXE installation. Core files are also generated.
Conditions:
Seen due to a timing issue after PXE installation. Some containers come up before they can be supported.
Impact:
Containers crash or functionality is impacted. Core files are generated.
Workaround:
Modify the /var/docker/config/platform.yml with information below:
+ selinux_labeler:
+ container_name: selinux_labeler
+ image: +${platform_services_registry}/system_network:1.4.14
+ volumes:
+ - /var/F5/system:/var/F5/partition:z
+ labels:
+ f5.service.type: "system"
identifier:
container_name: system_latest_vers
image: ${platform_services_registry}/system_network:1.4.14
+ depends_on:
+ - selinux_labeler
Then, restart the platform-services-deployment.service.
Fix:
Containers should not be crashing after a PXE installation now. No core files should be generated.
1324737-1 : The output of the command "ethtool --show-priv-flags" on all interfaces needs to be collected in QKView
Links to More Info: BT1324737
Component: F5OS-A
Symptoms:
Before, output from the command "ethtool --show-priv-flags" was not being collected in QKView for any of the interfaces.
Conditions:
The user generates a QKView file. The output of the command "ethtool --show-priv-flags" is missing in the 'Commands' section of the QKView.
Impact:
Having access to this command's output will help to identify if the 'vf-true-promisc-support' flag is SET/UNSET. This additional information can help the support team debug issues.
Workaround:
N/A
Fix:
Output for the command "ethtool --show-priv-flags" is now collected for each interface in the 'Commands' section of QKView.
1322817-4 : BIND vulnerability CVE-2023-2828
Links to More Info: K000135312, BT1322817
1320637-3 : DMA Agent crash after SEP file mapping error
Links to More Info: BT1320637
Component: F5OS-A
Symptoms:
When DMA Agent is unable to map the SEP block for a newly deployed tenant it may crash during shutdown.
Conditions:
Insufficient resources to deploy the tenant.
Impact:
The crash occurs on shutdown, it has no impact.
Workaround:
None
Fix:
DMA Agent does not crash after a SEP mapping failure.
1317793-1 : F5OS qat-support-pod service crashed with SIGBUS error
Links to More Info: BT1317793
Component: F5OS-A
Symptoms:
Sometimes, a script inside qat-support-pod cannot handle when it gets a SIGBUS signal.
Conditions:
Intermittently seen without any specific conditions.
Impact:
No functional impact, only a core file gets generated.
Workaround:
N/A
Fix:
We haven't seen this issue since the fix went in. However, since there isn't a specific use case to repro, the exact scenario can't be tested.
1316097-3 : LAGs not programmed when adding VLAN to LAG
Links to More Info: BT1316097
Component: F5OS-A
Symptoms:
Traffic from a LAG is not reaching the tenant.
Conditions:
1) Add a VLAN to a LAG and add that VLAN to a tenant in the same commit.
2) Configuration read following blade reboot.
Impact:
LAGs are not programmed; traffic doesn't reach tenant.
Workaround:
Workaround for condition (1): Add the VLAN to the LAG, commit; then add the VLAN to the tenant.
Fix:
Fix usage of mutexes to prevent deadlock with LAG programming is happening in parallel with VLAN programming.
1315149-4 : Users authenticated via TACACS+ cannot log in via serial console
Links to More Info: BT1315149
Component: F5OS-A
Symptoms:
If remote authentication is configured to use TACACS+, users authenticated via TACACS+ cannot log in via the system serial console.
SELinux errors in /var/log/audit/audit.log similar to the following:
type=AVC msg=audit(1691528610.427:121): avc: denied { name_connect } for pid=13249 comm="login" dest=49 scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket permissive=0
Conditions:
-- TACACS+ remote authentication.
-- Attempting to log in to system via serial console.
Impact:
Only locally-defined users can log in to the system via serial console.
Workaround:
Configure the SELinux policy to allow this traffic. On a VELOS chassis, these instructions must be run on each system controller separately.
1. Connect to the F5OS system via SSH as root.
2. Examine the SELinux audit denials and confirm all of them are associated with traffic that should be allowed:
grep 'denied.*name_connect.*comm="login"' /var/log/audit/audit.log > /root/login-audit-denials.log
cat /root/login-audit-denials.log
Remove entries from the file /root/login-audit-denials.log that you do not want to allow.
3. After confirming the contents of the file /root/login-audit-denials.log, run the following commands to create and install an SELinux policy to allow that traffic:
audit2allow -M login.allowtacacs < /root/login-audit-denials.log
semodule -i login.allowtacacs.pp
Fix:
A missing SELinux exception has been added. Users authenticated via TACACS+ are now able to log in via serial console without having to manually add the exception or turning off SELinux.
1315121-1 : Key migration failure and potential corruption updating to 1.5.0 or later with deployed tenants
Links to More Info: BT1315121
Component: F5OS-A
Symptoms:
When setting a new primary key after upgrading from an older release (such as 1.1.1 or older), where tenants are deployed, to 1.5.0 or newer, the key migration may fail.
The migration failure may cause configuration database corruption for the entire system.
Conditions:
Tenants are deployed on release 1.1.1 or older. Upgrade to 1.5.0 or newer (including through intermediate upgrades, such as 1.1.1 -> 1.3.2 -> 1.5.1). Set new primary key.
Impact:
Setting a new primary key may fail. When this failure occurs, system configuration corruption may occur.
Workaround:
Mitigation to prevent failure:
- Change all tenants to the configured state
- Set a new primary key
- Wait for key migration to complete
- Return tenants to deployed state.
Recovery for corruption:
- Reset device to default configuration
- Set the primary key to the known primary key for a known-good backup
- Restore with known-good backup
Fix:
Fix known causes of database corruption on primary key migration failure. While the primary key configuration may still fail if tenants are in deployed state, it should no longer cause system corruption.
1315065-4 : RSA-1024 SSH public keys should not be allowed in FIPS mode
Links to More Info: BT1315065
Component: F5OS-A
Symptoms:
When logging into an F5OS or BIG-IP system that is in FIPS mode, RSA-1024 SSH public keys should not be allowed to make the connection. Users should instead be prompted for a password.
Conditions:
User creates a RSA-1024 SSH public key and uses it to connect to the system, while the system is in FIPS mode.
Impact:
The user is allowed to authenticate with the key, which should not be allowed.
Workaround:
N/A
Fix:
Users cannot authenticate with a RSA-1024 SSH public key while the system is in FIPS mode.
1314917-2 : Command "show system health components component psu-2" results in errors
Links to More Info: BT1314917
Component: F5OS-A
Symptoms:
When a second PSU is added to an R2/R4 device, the system health does not show psu-2 as a known component.
Conditions:
After inserting a second PSU, if a power cycle or system reboot happens, sometimes diag-agent as diag-agent is not completely up; it is missing the bmc-events generated for PSU presence and updating as not present.
Impact:
This will cause diag-agent to update the PSU as not present, and it will not be shown in "show system health".
Workaround:
Provided below platform-hal psf action as work around, which will generate bmc-events for psu-presence again.
docker exec -ti platform-hal psf run POST:bmc/rearm-sensor-events sensorNumber=1
docker exec -ti platform-hal psf run POST:bmc/rearm-sensor-events sensorNumber=2
Fix:
Updated diag-agent to initiate bmc re-arm sensors only once diag-agent is up properly, so that it does not miss any bmc-events.
1314453-1 : Datapath is broken when LAG type is changed from LACP to Static on r2000/r4000 platforms
Links to More Info: BT1314453
Component: F5OS-A
Symptoms:
After changing the LAG type to Static, the datapath on the BIG-IP tenant starts failing and the BIG-IP tenant reports the LAG is DOWN.
Conditions:
-- r2000 and r4000 platform
-- The LAG type is changed from LACP to Static.
Impact:
Datapath is completely broken while using the LAG configured.
Workaround:
Bring the members of the LAG DOWN and back to UP:
interfaces interface <ifc name> config admin disable
interfaces interface <ifc name> config admin enable
Fix:
Datapath no longer breaks when changing the LAG type from LACP.
1313329-2 : Downloaded F5OS ISO file missing after reboot
Links to More Info: BT1313329
Component: F5OS-A
Symptoms:
The system deletes the ISOs which are not verified. If a user reboots the system while an ISO import in progress, the ISO "fails" the verification and is deleted.
Conditions:
Seen if a user reboots the system while an ISO import is in progress (e.g. verifying state).
Impact:
ISO file will be deleted.
Workaround:
Download the ISO again and wait until it has been verified to reboot.
Fix:
There is no longer an issue with rebooting the system while an ISO import is in progress.
1312169-2 : User expiration is not configurable nor viewable on the webUI
Links to More Info: BT1312169
Component: F5OS-A
Symptoms:
User expiration is not configurable nor viewable on the webUI.
Conditions:
Trying to configure/view user expiration on webUI.
Impact:
The user cannot view or modify the expiry information for a system user account.
Workaround:
The expiry information for a user account can be viewed or configured at CLI.
Fix:
On the webUI the "Account Locked" widget will be replaced by the "Expiry Status" configuration which will allow locking the user in a similar fashion as the CLI.
1311953-1 : Platform-services-deployment service does not come up when system reboots early after PXE install
Links to More Info: BT1311953
Component: F5OS-A
Symptoms:
Observed that platform-services-deployment service fails to come up if the system reboots while image import is in-progress after a system PXE install.
Conditions:
Issue only happens after PXE install if the system reboot is triggered while image import is in-progress. The platform-services-deployment startup script was not waiting long enough to setup the env_var file by sw-mgmt.
Impact:
Platform-services-deployment does not come up for the system.
Workaround:
N/A
Fix:
Implemented retry mechanism in platform-services-deployment startup script which will wait for the env_var file setup by sw-mgmt service.
1311049-1 : For a system that has interfaces with 1GB speed, the network tab on the webUI dashboard is not showing all information
Links to More Info: BT1311049
Component: F5OS-A
Symptoms:
If a system has an interface with a speed of 1GB, when the user opens the Network tab on the webUI dashboard, the data that is supposed to be shown on the system graphic (such as interface speed and operational status) are not shown.
Conditions:
A system that has an interface with 1GB speed.
Impact:
The system graphic on the Network tab of the webUI dashboard is not showing interface information.
Workaround:
N/A
Fix:
Now the code is made to handle any port speed coming from the back-end response.
1306869-1 : CVE-2021-44716 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974
Component: F5OS-A
Symptoms:
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
Conditions:
N/A
Impact:
N/A
Workaround:
N/A
Fix:
net/http in Go has been upgraded to a non-vulnerable version.
1306861-1 : CVE-2022-30633 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974
Component: F5OS-A
Symptoms:
Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows a user to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.
Conditions:
Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4
Impact:
N/A
Workaround:
N/A
Fix:
Go has been updated to a non-vulnerable version.
1306773-1 : CVE-2022-27664 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974
Component: F5OS-A
Symptoms:
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
Conditions:
N/A
Impact:
N/A
Workaround:
N/A
Fix:
Go has been updated to a non-vulnerable version.
1306749-1 : CVE-2022-28131 in golang.org/x/net-v0.0.0-20201021035429-f5854403a974
Component: F5OS-A
Symptoms:
Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows a panic due to stack exhaustion via a deeply nested XML document.
Conditions:
Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4
Impact:
This may cause a panic due to stack exhaustion via a deeply nested XML document.
Workaround:
N/A
Fix:
Go has been updated to a non-vulnerable version.
1306649-1 : Rapid removal and re-insertion of 10G optics may result in link failure
Links to More Info: BT1306649
Component: F5OS-A
Symptoms:
An interface link remains down.
Conditions:
Removing and re-insertion of the SFP module within a few seconds.
Impact:
Interface link remains down.
Workaround:
There are two workarounds:
1. After removing the SFP module, wait for 2 to 3 minutes before re-inserting the SFP module. This may not work 100% of the time.
2. Reboot the appliance.
1305909 : iHealth upload not supported on F5OS-A
Links to More Info: BT1305909
Component: F5OS-A
Symptoms:
The iHealth upload service has changed its authentication schema to OKTA, and requires a Client ID and Client Secret rather than a User ID and Password. Version 1.5.1 (and previous versions) of F5OS-A do not support this authentication schema.
Conditions:
Always
Impact:
Users will not be able to directly upload QKView files to iHealth from the appliance because of change in the authentication schema.
Workaround:
1. Use the file export feature to download the QKView from the appliance to a local PC.
2. Sign on to ihealth.f5.com.
3. Use the upload feature to upload the QKView to the iHealth service.
Fix:
Added Client ID and Client Secret fields in the iHealth page on webUI. User can upload QKView files to iHealth.
1305005-3 : Error handling in F5OS file-download API
Links to More Info: BT1305005
Component: F5OS-A
Symptoms:
Upon file download failure, API is returning an Apache error page that isn't an F5OS-specific error and isn't aligned with other F5OS API errors. This is a negative user experience.
Conditions:
Due to unhandled errors, when data not in the FormData format are passed through a Curl request, an Apache error page is thrown, misaligning from other F5OS APIs errors.
Impact:
There is no functional impact. It is a negative user experience.
Workaround:
N/A
Fix:
All errors are handled in the file-download API and aligned with other F5OS APIs errors with no more Apache error pages in error cases.
1304765-2 : A remote LDAP user with an admin role is unable to make config changes through the F5 webUI
Links to More Info: BT1304765
Component: F5OS-A
Symptoms:
When a remote user's GID is mapped to the F5OS system's local GID, the GID mapping is not parsed correctly by the system. If the remote GID is known to the F5 system, there is no issue. For example, a mapping of the form 9000:9000 works fine. However, mapping of the form 5555:9000, 6666:9000 etc. will not work.
Conditions:
Local GID is being mapped to a remote GID.
Impact:
The admin user mapped to a remote GID cannot access the ConfD config mode.
Fix:
Update the system to the version with the fix.
1304657-1 : Tcam-manager does not support all the possible system network subnets
Links to More Info: BT1304657
Component: F5OS-A
Symptoms:
The connection from the tenant (TMM) to the tcam-manager is continuously restarts.
tcam-mgr logs show the wrong tenant-id and hence rejected connection from the tenant:
msg="INFO" MSG="Connection from client address:10.245.3.1".
msg="ERROR" MSG=" Confd access error obtaining tenant info for tenant:12291 slot:1".
msg="INFO" MSG="neuron_handle_responses: dropping resp to non-existent client".
TMM periodically logs neuron client errors, such as:
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice pva_sc_frs_neuron_stopped_cb/2373: FRS SC: Neuron client stopped.
Conditions:
The 'system network' configuration is changed from its default setting in F5OS to an affected RFC1918 subnet.
Impact:
TCAM based features don't work.
Workaround:
Select either the default RFC6598 subnet or any of the unaffected RFC1918 subnets (prefix: 0, 4, 8, 12).
Fix:
Tcam-manager now correctly calculates the tenant-id for all possible system network subnets.
1301837-3 : A remote admin user is not able to enter the ConfD config mode when logged in from SSH
Links to More Info: BT1301837
Component: F5OS-A
Symptoms:
When a remote user's GID is mapped to the F5OS system's local GID, the GID mapping is not parsed correctly by the system. If the remote GID is known to the F5 system, there is no issue. For example, a mapping of the form 9000:9000 works fine. However, mapping of the form 5555:9000, 6666:9000 etc. will not work.
Conditions:
Local GID is being mapped to a remote GID.
Impact:
The admin user mapped to a remote GID cannot access the ConfD config mode.
Workaround:
No workaround.
Fix:
Update the system to the version with the fix.
1301169-1 : K3S goes down when OMD is restarted
Links to More Info: BT1301169
Component: F5OS-A
Symptoms:
K3S went down and failed to come up when OMD restarted due to memory corruption.
Conditions:
This is caused by not having essential flags in the system.
The appliance OMD is dependent on the flags inside /var/omd directory.
Impact:
When K3S goes down, the cluster is down, which results in service down.
Workaround:
When the cluster goes down due to missing flags, it can be brought back up by clearing the stale flags and tokens. Please contact F5 Support.
Follow instructions in https://my.f5.com/manage/s/article/K08061420
Fix:
1. Logs are in place if the /var/omd/ flags gets deleted or added.
2. Cluster will come up even if it is going to a bad state.
1300805-1 : Allowing the tenant configuration with more memory than max memory in the appliance
Links to More Info: BT1300805
Component: F5OS-A
Symptoms:
This will not have any functional impact.
Tenant configuration will be accepted but the tenant won't be up. And we see a failure message in "show tenants" with resource allocation failed.
Conditions:
Configuring the tenant with the memory that is beyond the max limit.
Impact:
It is the faulty config for the tenant. No impact on the existing/running tenants.
Workaround:
Delete the config and re-configure with valid memory.
1300749-2 : Syslog target files do not use the hostname configured via system user interface.
Links to More Info: K000135373, BT1300749
Component: F5OS-A
Symptoms:
Syslog target files, for example: /var/F5/system/log/platform.log, use a fixed nodename (appliance-1) for every device as a hostname.
Conditions:
Viewing syslog files, especially on a remote syslog server.
Impact:
In a remote log collector, source IPs are the only way to differentiate among devices.
Workaround:
It is possible to do an iRule workaround that replaces custom strings in syslog traffic depending on the client's IP address. This iRule is applied to the virtual server on another LTM that consumes the syslog traffic and load balances.
when CLIENT_DATA {
switch [IP::client_addr] {
"10.10.10.10" { UDP::payload replace 38 11 "ABCDC01F5OS01" }
"10.10.10.20" { UDP::payload replace 38 11 "ABCDC01F5OS02" }
}
}
Below is the example message after irule workaround.
Jul 31 03:33:50 10.10.10.10 2023-07-31T07:33:50.181136+00:00 appliance-1 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 0 (1:Enabled 2:Disabled ... )".
to this
Jul 31 06:00:01 10.10.10.10 2023-07-31T10:00:01.356324+00:00 ABCDC01F5OS01 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 1 (1:Enabled 2:Disabled ... )".
Jul 31 06:00:04 10.10.10.20 2023-07-31T10:00:04.983677+00:00 ABCDC01F5OS02 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 0 (1:Enabled 2:Disabled ... )".
Fix:
Infrastructure to use the system hostname user configuration in the syslog target logs has been added with the setting 'system logging config include-hostname'. It is enabled by default, and can be turned off if old behavior is preferred.
1298329-2 : F5OS tcpdump capture fails to run after F5OS software downgrade★
Links to More Info: BT1298329
Component: F5OS-A
Symptoms:
SELinux shared label set by identifier container for the common path shared across all the containers. This issue started when node-agent container was introduced without dependency.
The system repeatedly logs this message to the platform log:
tcpdumpd-manager[8]: priority="Crit" version=1.0 msgid=0x5406000000000018 msg="[] global_dmaa_comm init_comm failed ret:" this=0x17c6b50 ret=3.
Attempting to run an F5OS tcpdump fails with the following error:
appliance-1# system diagnostics tcpdump -nni 3.0 tcp
running /usr/sbin/tcpdump -nnn "-nni" "3.0" "tcp"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on 3.0, link-type EN10MB (Ethernet), capture size 262144 bytes
errbuf ERROR:INIT error, line-dma-agent init returned fatal status, packets cannot be captured
tcpdump: pcap_loop: INIT error, line-dma-agent init returned fatal status, packets cannot be captured
0 packets captured
0 packets received by filter
0 packets dropped by kernel
Conditions:
This issue seems to occur when downgrading a system to an affected version.
Impact:
Tcpdump capture fails.
Workaround:
This issue can be resolved by doing the following:
1. Log into the system as root
2. Edit /var/docker/config/platform.yml
3. Locate the configuration for 'tcpdumpd-manager', and replace the volume that reads:
- /var/F5/system:/var/tcpdump:z
with:
- /var/F5/system:/var/tcpdump
4. Save the file
5. Reboot the appliance
Fix:
Root cause of this issue was fixed as part of ID1326157.
1298021-3 : CVE-2023-2253: DOS attack possible using massive string arrays in golang
Links to More Info: K000151459, BT1298021
1297665-1 : Occasionally diagnostic agent reports as unhealthy for unpopulated PSU_Slot in health summary and ihealth reports
Links to More Info: BT1297665
Component: F5OS-A
Symptoms:
Diagnostic agent reports as unhealthy for unpopulated PSU_Slot in ihealth reports and "show system health summary" output.
Conditions:
Occurs only when any empty PSU slots are in the system and diagnostic agent receives PSU Input State events in different order.
Impact:
It causes diagnostic agent to report as unhealthy for PSU on the unpopulated slot in health summary.
Workaround:
N/A
1296997-2 : Large core files can cause system instability
Links to More Info: BT1296997
Component: F5OS-A
Symptoms:
When a system generates and stores large core files, it can cause the system unstable.
Conditions:
F5OS generates a large core file.
Impact:
F5OS core-writing script does not check filesystem availability before writing a core file and can fill up the filesystem, causing catastrophic system instability until disk-space is reclaimed.
For more information of other impacts see
1185577 - F5OS-A memory leak in ImageAgent process on rSeries hosts may affect tenant performance or lead to unexpected restarts of tenant or host
https://cdn.f5.com/product/bugtracker/ID1185577.html
1284705 - Appliance Orchestration Manager core file may consume entire root filesystem
https://cdn.f5.com/product/bugtracker/ID1284705.html
1290949 - Invalid memory read in appliance orchestration manager
https://cdn.f5.com/product/bugtracker/ID1290949.html
1327701 - Space in SNMP community/user/target name causing snmpd container restart
https://cdn.f5.com/product/bugtracker/ID1327701.html
Workaround:
None
Fix:
F5OS now takes into account the available filesystem space before writing a core file. If the core file is too large then it will be truncated and deleted to maintain system stability. The system log message will indicate if the core file was too large to safely write.
1296525-2 : qkview may capture log files truncated in a reverse way
Links to More Info: BT1296525
Component: F5OS-A
Symptoms:
qkview captures log files, but may truncate them if too large (greater than 100 MB). A regression was introduced such that the most recent log entries would be truncated rather than the oldest.
Conditions:
Collection of qkview.
Impact:
Log entries may be missing in qkview capture.
Workaround:
When running a qkview capture, specify the maxfilesize argument to 1000 (1 GB).
system diagnostics qkview capture maxfilesize 1000
Fix:
QKview now collects the tail end of log files.
1295657-1 : ARP probes to rSeries management IP are answered by both mgmt and mgmt0-system
Links to More Info: BT1295657
Component: F5OS-A
Symptoms:
Intermittent management connectivity issues.
Conditions:
ARP probers to rSeries mgmt-ip.
Impact:
Intermittent management connectivity issues.
Workaround:
A temporary workaround is to update the arp-related kernel paraments on the mgmt interface.
sysctl -w net.ipv4.conf.mgmt.arp_ignore=2
sysctl -w net.ipv4.conf.mgmt.arp_announce=1
sysctl -w net.ipv4.conf.mgmt.rp_filter=1
1294581-2 : WebUI header shows FQDN for IP address field instead of management IP
Links to More Info: BT1294581
Component: F5OS-A
Symptoms:
The IP Address field displayed on the login page and on the top section of the GUI displays the hostname, not the IP address.
Conditions:
Accessing the F5OS GUI via the FQDN and not the IP address.
Impact:
There is no impact on functionality but the FQDN is displayed, not the management IP.
Workaround:
To view the management IP address, navigate to the Management IP screen.
Fix:
Login using FQDN shows the IP address on the header instead of the FQDN. Additionally, the IP address label on the login screen is renamed to Address.
1294341-1 : The system freezes if abruptly rebooted during software upgrade process.
Links to More Info: BT1294341
Component: F5OS-A
Symptoms:
The system software upgrade process freezes infinitely if the system rebooted abruptly.
Conditions:
This issue occurs if the system is rebooted abruptly when the software upgrade is triggered.
Impact:
Not able to perform upgrade/downgrade to other build as the process is frozen in upgrade state.
Workaround:
None
Fix:
It is possible to upgrade/downgrade to a new build even after the system is frozen due to an abrupt reboot.
1293305-2 : LAG interface status is not updated on the BIG-IP tenant
Links to More Info: BT1293305
Component: F5OS-A
Symptoms:
Symptom 1: Trunk is down in tenant but the LAG is up in F5OS-A.
Symptom 2: LAG is down in F5OS-A but the trunk is up in tenant.
Symptom 3: LAG is down in VELOS partition but the trunk is always up in tenant.
Conditions:
For symptom 1:
1. Set up new rSeries device.
2. Config static LAG and VLAN.
3. Deploy new tenant.
4. In tenant, LAG will be shown as down but interfaces shown as up.
5. This happens only at initial tenant deployment.
For symptom 2:
1. LAG is shown as down in F5OS-A.
2. Trunk is shown as up in tenant.
For symptom 3:
1. LAG is shown as down in VELOS partition.
2. Trunk is always shown as up in tenant.
Impact:
Symptom 1:
On r2x00/r4x00 platforms, as LAG will be in DOWN state, datapath will not be working.
Symptom 2:
On r2x00/r4x00 platforms, LAG status is shown as UP but it's actually DOWN on the platform. Datapath will not be UP, but as LAG is UP in tenant we expect Datapath to be UP.
Symptom 3:
If trunks are used for HA Group the scores associated to the trunks are not deducted from the overall health scores regardless of whether the interfaces in the trunks are up or not.
Workaround:
For symptom 1:
Restarting "system_api_svc_gateway" service on host.
#docker restart system_api_svc_gateway
For symptom 2:
Restarting "system_api_svc_gateway" service on host.
#docker restart system_api_svc_gateway
For symptom 3:
Restarting "partition_api_svc_gateway" on blades have no effect. Request an EHF on VELOS controller and partition/s.
1292405-1 : CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64
Links to More Info: K000137702, BT1292405
1291461-3 : LCD shutdown does not work on r2800 and r4800 platforms
Links to More Info: BT1291461
Component: F5OS-A
Symptoms:
In F5OS-A versions 1.4.0 and later, the button on the LCD menu that is used to shut down the system, when pressed, does not shutdown the system.
Conditions:
With F5OS-A 1.4.0 or later installed, from the LCD touchscreen, click the System button. Select Shutdown from the menu. Click the Shutdown button at the 'Shutdown the system?' prompt.
Impact:
The LCD touchscreen is lacking functionality the user is expecting it to have.
Workaround:
In an external terminal, connect to the unit's AOM. Select P for "Power on/off host subsystem", and then 0 for "Turn host subsystem off". Or, if the system is off, 1 for "Turn host subsystem on"
Fix:
Going into the AOM menu and powering off or powering on the system works as expected and achieves the same thing as using the LCD Shutdown button.
1290949-1 : Invalid memory read in appliance orchestration manager
Links to More Info: BT1290949
Component: F5OS-A
Symptoms:
"Invalid read" identified in OMD.
During "show cluster events" we are hitting the code flow, where the ConfD API is reading the freed memory. It is leading to an invalid read.
Conditions:
Executing "show cluster events".
Impact:
Using a freed memory may cause unexpected behavior in the system.
Workaround:
N/A
Fix:
Code changes to address memory violations in the code.
1290941-1 : LLDP/STPD/LACPD in rSeries is flooding SEP_POLLERR when dma-agent restarts
Links to More Info: BT1290941
Component: F5OS-A
Symptoms:
Below log is flooded in platform.log when dma-agent restarts
"SEP library in ERR state, sep_client_poll() returns SEP_POLLERR".
Conditions:
dma-agent restart.
Impact:
l2 functions such as LLDP/STPD/LACPD will be affected.
Workaround:
Reboot the device.
Fix:
Fixed code from flooding logs.
1290617-2 : Display option "universal-time" is not supported
Links to More Info: BT1290617
Component: F5OS-A
Symptoms:
The display option "universal-time" is a built-in third-party command that F5OS does not support.
Conditions:
User attempts to access the built-in third-party command "universal-time."
Impact:
The correct output for "universal-time" is not displayed. Proper documentation for this third-party command also cannot be found.
Workaround:
N/A
Fix:
F5OS has suppressed this display option.
1290053-1 : VELOS Software version may not be collected consistently across platform by QKView
Component: F5OS-A
Symptoms:
The QKView version format is different as collected by F5OS-A and F5OS-C, and this is reflected when the QKView is displayed by the iHealth service.
Conditions:
This always occurred when capturing a QKView.
Impact:
Occasional parsing difficulties on the iHealth service.
Workaround:
Examine the /etc/PRODUCT file contained in file collection for the host subpackage.
Fix:
Version information format as reported in the manifest.json file within a QKView is now consistent between F5OS-A and F5OS-C.
1289633-2 : FIPS devices show incorrect vCPUs
Links to More Info: BT1289633
Component: F5OS-A
Symptoms:
1. The Dashboard System Summary shows 36 vCPUs rather than the actual number of vCPUs available for Tenant Deployment.
2. The Add/Edit Tenant deployments screen allows selecting up to 36 vCPUs instead of the maximum vCPUs that the platform supports.
Conditions:
FIPS device.
Impact:
No functional impact.
Workaround:
Users can view the correct value for total vCPUs for tenant deployment on the device from the CLI using the following command:
"show cluster nodes node node-1 state node-info"
Fix:
vCPUs information will show appropriately on the dashboard based on the platform support, and Add/Edit Tenant deployment screen will have vCPU options up to the maximum that the platform supports and not beyond that.
1289029-3 : Toggling lag-type can sometimes cause an F5OS LACP aggregation to pass traffic while the peer does not have LACP configured.
Component: F5OS-A
Symptoms:
An F5OS LACP aggregation can sometimes allow traffic to pass when it should not.
Conditions:
1) With peer devices that cause link status to flap on aggregation configurations: Toggle F5OS aggregation lag-type from LACP, to STATIC. Toggle peer aggregation from LACP to STATIC. Toggle F5OS aggregation lag-type from STATIC to LACP.
2) Create an aggregation interface with STATIC lag-type, change the lag-type to LACP, then create a lacp interface. Configure the peer aggregation as a STATIC aggregation.
Impact:
Traffic will pass on an aggregation when LACP has not negotiated for affected interfaces.
Workaround:
Disable, then enable affected interfaces.
Fix:
Under no scenario will traffic pass on an interface in a LACP aggregation that has not negotiated LACP with its peer.
1288937-2 : Interface persists with removed VLAN
Links to More Info: BT1288937
Component: F5OS-A
Symptoms:
When a VLAN is deleted while being referenced by an interface or LAG, it cannot be de-referenced from the interface/LAG.
Conditions:
Delete the VLAN before removing the VLAN from the interface.
Impact:
Cannot add the interface to a LAG after deleting VLAN(s) that used the interface.
Workaround:
Recreate the removed VLAN, then edit the interface which shows defined VLAN, remove the defined VLAN, then remove the recreated VLAN.
Fix:
With the fix, the user will be able to view and remove the VLAN in the Add/Edit Interface/LAG screen even if the VLAN was deleted, and thus will be able to detach it from the interface/LAG.
1286285-3 : ISO with special characters in name will not import
Links to More Info: BT1286285
Component: F5OS-A
Symptoms:
An ISO named with special characters like "()" will not be imported and gets deleted from the import directory silently.
Conditions:
Only when the ISO name contains special characters.
Impact:
User will not have any status on the imported image with a name that contains special characters.
Workaround:
No workaround.
Fix:
The "show system image" API will display the status as "Import error. File name is incorrect."
1286165-1 : Ping failing after removing aggregate ID from interface and adding trunk VLANs in the same commit
Links to More Info: BT1286165
Component: F5OS-A
Symptoms:
Ping to self IP of tenant failing.
Conditions:
This issue will be observed only when tried from F5OS ConfD CLI.
Removing aggregate ID and assigning trunk VLANs to an interface in the same commit from ConfD CLI.
Impact:
Ping to self IP of tenant will fail.
Workaround:
From F5OS CLI
1)Remove aggregate ID from interface.
2)commit the changes.
3)Add trunk VLANs to interface and commit the changes.
For example:
1)no interfaces interface 3.0 ethernet config aggregate-id
2)commit; top
3)interfaces interface 3.0 ethernet switched-vlan config trunk-vlans [ 3700 3800 3900 ]
4)commit
Fix:
NA
1285969 : Some aggregation interface names can cause ethernet interfaces in LACP aggregations to be erroneously down
Links to More Info: BT1285969
Component: F5OS-A
Symptoms:
One or more interfaces in LACP aggregations may be considered down when they should not be.
Conditions:
Internally, LACPD hashes interfaces to an integer, and some aggregation interface names hash will collide with ethernet interface name hash. Changes to the these aggregation interfaces can impact the ethernet interface.
Impact:
Traffic through the affected ethernet interface in LACP aggregations may be disrupted. This can cause either degraded performance or traffic failure for LACP aggregations that the interface is a member of.
Workaround:
Only use aggregation interface names that don't hash to the same port numbers as ethernet interfaces.
In order to determine if an existing aggregation interfaces port number conflicts with an ethernet interface, review the lacpd_interface_stat table.
For a VELOS partition, use the lacpd container on any blade in the partition to run tmctl.
For an appliance, use system_lacpd container to run tmctl.
The following example from a rSeries appliance shows the aggregation interface "vlag" with the same port number as interface 1.0
[root@appliance-1 ~]# docker exec -it system_lacpd bash
[root@appliance-1 partition]# tmctl lacpd_interface_stat -s name,port_num
name port_num
---- --------
1.0 1024
10.0 10240
2.0 2048
3.0 3072
4.0 4096
5.0 5120
6.0 6144
7.0 7168
8.0 8192
9.0 9216
mgmt 43008
vlag 1024
If an aggregation interface hashes to the same port number an Ethernet interface:
1. Delete the conflicting aggregation interface
2a. You can either restart the lacpd containers
or
2b. Reboot the appliance, or for VELOS reboot each blade in the partition.
Fix:
Aggregation interface names will never impact ethernet interfaces in a LACP aggregation.
1285669-3 : CVE-2022-21216 - Intel BIOS vulnerabilities on r2000/r4000 and r5000/r10000/r12000
Links to More Info: K000133432
1285149-3 : Patch releases report the wrong version in various log files.
Links to More Info: BT1285149
Component: F5OS-A
Symptoms:
F5OS-A patch files are not correctly set for patch versions.
Conditions:
Patch version release.
Impact:
Patch releases falsely report it as a non-patched release in log files.
Workaround:
None
Fix:
None
1284681-3 : IPv6 connections made through port 80 fail
Links to More Info: BT1284681
Component: F5OS-A
Symptoms:
IPv6 connections made through port 80 are failing as there are no NAT rules present for port 80.
Conditions:
Issue is observed in all conditions.
Impact:
IPv6 connections through port 80 will fail.
Workaround:
N/A
Fix:
Added a NAT rule for port 80 which allows IPv6 connections.
1284389-1 : Show system health reports unhealthy during bootup
Links to More Info: BT1284389
Component: F5OS-A
Symptoms:
In FIPS supported hardware, during the device boot-up, show system health report shows unhealthy due to fips-state reports -1 during boot-up.
Conditions:
-- during boot-up
-- FIPS partition not initialized
Impact:
No functionality impact, it's a cosmetic issue and reports unhealthy in confd and logging.
Workaround:
None
Fix:
While the device is booting, the fips state starts with -1 and it shows unhealthy till the device completely boots up, but actually, the -1 state is not initialized, so updated the code that, don't report the -1 state as unhealthy.
1284269-1 : Config restore fails if it contains an SNMP user
Links to More Info: BT1284269
Component: F5OS-A
Symptoms:
Error when restoring the config
appliance-1(config)# system database config-restore name with.mgmt.snmpuser.xml
A clean configuration is required before restoring to a previous configuration.
Please perform a reset-to-default operation if you have not done so already.
Proceed? [yes/no]: yes
Error: access denied
Database config-restore failed.
Conditions:
Backup contains an SNMP user.
Impact:
Cannot restore configuration.
Workaround:
There are two possible workarounds.
Workaround 1:
- Edit the configuration backup and remove the SNMP user related configuration.
- Restore the backup
Workaround 2:
- Create a SNMP user in device before restoring backup.
- Restore the backup
Fix:
Issue is fixed. Now the user can take a configuration backup and restore it, even with an SNMP user configured.
1284193-1 : GRUB2 vulnerability CVE-2022-28733, Samba vulnerability CVE-2021-20277, DHCP vulnerability CVE-2021-25217
Links to More Info: K000132893, BT1284193
1283641-1 : Docker network is not updating as part of internal IP ranges configurations
Links to More Info: BT1283641
Component: F5OS-A
Symptoms:
Docker network needs to be updated as per network-range-type.
Conditions:
Configuring the network-range type is not affective on docker network.
Impact:
This bug causes docker network to not update as per network-range-type.
Workaround:
Edit the/etc/sysconfig/docker file manually and restart the docker.
Fix:
The root cause was '/etc/sysconfig/docker' getting overridden while running pre-deployment-setup. This task fixes the above issue.
1282757 : On upgrade, systems might overwrite key due to automatic firmware updating
Links to More Info: K000133379, BT1282757
Component: F5OS-A
Symptoms:
When upgrading to a new version (such as 1.4.0), automatic firmware updates occur, and these interfere with the encryption key retrieval, causing a new key to be generated, which blocks api-service-gateway.
Conditions:
Upgrading to a new version where automatic firmware updates get started at boot-up.
Impact:
The api-service-gateway container does not come up and there is no communication with the tenant.
Workaround:
docker exec -it system_manager bash
/confd/bin/confd_cmd -c "mdel /tenants/platform-self-signed-cert/self-signed-key"
/confd/bin/confd_cmd -c "mdel /tenants/platform-self-signed-cert/self-signed-cert"
Fix:
The encryption key will not generate a new key unless the TPM module has none. The code will continue to retry until it succeeds or ConfD timeout occurs (300 seconds).
1281861 : Tenants are stuck in Pending state with status 0/1 nodes available after upgrading to F5OS-A 1.2.0
Links to More Info: BT1281861
Component: F5OS-A
Symptoms:
The system is unable to start tenants, and the tenant reports a status of "Insufficient f5.com/qat".
Conditions:
Might occur after an F5OS-A software upgrade or after reinstalling K3s.
Impact:
Tenants will not start and are unusable.
Workaround:
To work around this issue, perform one of these actions:
1. Reboot the rSeries appliance.
or
2. Restart the qat-plugin process by logging into the appliance as root, and running "pkill qat-plugin".
Fix:
Fixed an issue with the qat-plugin process that prevented the system from starting tenants.
1281857-1 : Repeated disabling and enabling of link partner interface might result in datapath corruption
Links to More Info: BT1281857
Component: F5OS-A
Symptoms:
Packets received on an interface are corrupted or lost after a link partner interface is repeatedly disabled and then enabled within relatively short windows of time.
Conditions:
A link partner interface is repeatedly disabled and then enabled within relatively short windows of time.
Impact:
Dataplane services on the given interface will be inoperable.
Workaround:
The product must be rebooted to recover.
Fix:
An FPGA firmware fix was implemented to add an additional clock to an internal component that served to isolate noise between the MAC and itself.
1281749-1 : Hashed/encrypted passwords are getting logged
Links to More Info: K000134922, BT1281749
1281165-1 : CVE-2023-0767 in nss-tools-3.67.0-4.el7_9
Component: F5OS-A
Symptoms:
An attacker may create a PKCS 12 certificate bundle to exploit mishandling of PKCS 12 Safe Bag attributes, leading to arbitrary memory writes.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Upgraded to a non-vulnerable version of nss-tools.
1281157-1 : CVE-2023-0767 in nss-sysinit-3.67.0-4.el7_9
Component: F5OS-A
Symptoms:
An attacker may create a PKCS 12 certificate bundle to exploit mishandling of PKCS 12 Safe Bag attributes, leading to arbitrary memory writes.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Updated to a non-vulnerable version of nss-sysinit.
1281149-1 : CVE-2023-0767 in nss-3.67.0-4.el7_9
Component: F5OS-A
Symptoms:
An attacker may create a PKCS 12 certificate bundle to exploit mishandling of PKCS 12 Safe Bag attributes, leading to arbitrary memory writes.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Upgraded to a non-vulnerable NSS version.
1280953-4 : CVE-2021-33194: DOS attack possible using ParseFragment input in golang
Component: F5OS-A
Symptoms:
golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input.
Conditions:
NA
Impact:
NA
Workaround:
NA
Fix:
Golang has been updated to a non-vulnerable version.
1280749-2 : OCSP server state data and actual configured data is different in ConfD CLI
Links to More Info: BT1280749
Component: F5OS-A
Symptoms:
The OCSP server data shown from non-config mode in the ConfD CLI is different from actual configured data.
Conditions:
- Showing state data related to OCSP server from ConfD CLI.
Impact:
Inability to check the actual OCSP server value from non-config mode.
Workaround:
Workaround is to run 'show running-config' from non-config mode.
Fix:
When the user sets new values for the OCSP server configuration, the state data is updated as well so that the user can see the actual values from non-config mode.
1280365-3 : WebUI and shell admin access unavailable after upgrade to when one of the previously installed images is no longer present★
Links to More Info: K000133253, BT1280365
Component: F5OS-A
Symptoms:
1. WebUI or CLI inaccessible via admin account (that is, ConfD is not up):
[root@appliance-1(XXXXXXXXX) log]# su admin
Failed to connect to server
2. sw-mgmt.debug file will have a line similar to this one (with image version changing depending on which image is missing):
DEBUG: Source file /var/export/chassis/import/.mounts/iso/R2R4/1.1.1-9159/m3/*-services/F5OS*.img does not exist, removing from all_sw.
3. Containers stuck in ImagePullBackOff. For example, system_network container cannot be pulled, and the following error is observed in messages log:
appliance-1 dockerd-current: time="2023-03-24T15:09:26.631359235Z" level=error msg="Not continuing with pull after error: Error: image system_network:1.4.5-f5os-a-1-4-0-candidate.2023-02-14-15-09-15.S9b340f7e not found"
An error message may occur that reads "System database upgrade compatibility check failed"
Conditions:
Both of the below conditions:
1. Certain ISO image has been ungracefully removed from the /var/import/staging folder. Examples of ungraceful removals:
-- Deleted via bash (after running chattr -i <image name>)
-- Image name had parentheses in it and as per ID1273021 it is wiped out upon reboot.
2. /var/import/import.json file includes reference to removed image that is listed BEFORE the reference to currently used image.
Impact:
Device webUI is inaccessible. Cannot access ConfD. Root access is working.
Workaround:
Two workarounds:
1. Re-import the deleted image and reboot the box.
2. Remove the whole section that references the deleted image from import.json file and reboot the box.
Fix:
N/A
1280237-1 : Notification streams are sometimes empty using 'restconf/streams/platform-stats/json' API endpoint
Links to More Info: BT1280237
Component: F5OS-A
Symptoms:
When using the 'restconf/streams/platform-stats/json' API endpoint, the JSON object could be empty instead of being populated with platform stats.
Conditions:
The initial discovery of platform-stat had a logic flaw which prevented drive information from being correctly discovered. This caused the rest of the JSON object from being populated.
Impact:
The platform-stats notification stream endpoint would return an empty object instead of platform-stat data.
Workaround:
N/A
Fix:
The logic flaw has been resolved and the platform-stat notification stream is fully populated with stat information.
1273845-1 : Removing or manually adding TLS Certificate & Key on webUI removes whole TLS configuration
Links to More Info: BT1273845
Component: F5OS-A
Symptoms:
Manually adding TLS Certificate & Key on webUI instead of storing through Self-Signed Certificate or removing Certificate & Key removes TLS configuration, which includes verify-client and verify-client-depth.
Conditions:
- When there is an existing Verify Client and Client Depth configuration, and user tries to remove TLS Certificate & Key on Certificate Management screen on webUI.
- When user fills the TLS Certificate & Key on Certificate Management screen on webUI.
Impact:
Verify Client and Client Depth configuration of Certificate Authentication will be changed to default values which disables verification of httpd client certificates.
Workaround:
- Remove or Add TLS Certificate & Key through CLI.
- While creating Self-Signed Certificate, set "Store TLS" field as true
- Re-add Verify Client and Client Depth after removing or manually adding TLS Certificate & Key.
1273581-1 : CVE-2023-25690 httpd: HTTP request splitting with mod_rewrite and mod_proxy
Links to More Info: K000133098, BT1273581
1273445 : Downgrade/upgrade issues are seen because ISO has special characters in the file name★
Links to More Info: BT1273445
Component: F5OS-A
Symptoms:
If a F5OS-A ISO with a filename containing 'special characters' ('+ , * , ? , ^ , $ , ( , ) , [ , ] , { , } , | , \') is imported onto the device, and the system is downgraded/upgraded with this ISO, it can result in the upgrade/downgrade failing.
Conditions:
1. Download and import an ISO with a 'special character' in its name (for example,F5OS-A-1.5.0-*.iso.
2. Attempt an upgrade /downgrade.
3. Upgrade/downgrade will fail.
Impact:
Upgrade/downgrade will fail, requiring manual intervention to recover the system.
Workaround:
1. Before performing a platform software upgrade, compare versions referenced by the "show system image" ConfD CLI command with the names of files present in the "/var/import/staging” directory.
If the ISO is not present in /var/import/staging but it is shown in "show system image" command output, then import again to "/var/import/staging”.
2. If there is any ISO file with a name containing a special character present in "/var/import/staging”, remove that version of platform software and re-import it by re-downloading the file with a name that does not include special characters. You may then attempt upgrade.
3. In order to remove that ISO file with a name containing a special characters use the below command.
appliance-1(config)# system image remove iso <iso version>
4. In scenarios where the above command fails or where it is not possible to use above command, please follow the below procedure to delete the image.
* login to the device using root
* chattr -i "/var/import/staging/<iso with special characters>”
* rm -rf "/var/import/staging/<iso with special characters>”
In case downgrade or upgrade failure has already occurred due to this issue, follow these steps to recover the system:
1. Download another copy of the ISO with a proper name to /var/import/staging.
2. Wait for five minutes for it to import. If ConfD is unavailable, you can check the logs in /var/log/sw-mgmt.debug for import status.
3. Once the import is complete, reboot the system. This should recover the system.
Fix:
The fix is to delete the ISO with the special characters when it is being imported.
1273025-1 : Once TACACS server-group is configured on a non-default port, on downgrade virt-handler pod gets into a crash loopbackoff state because of SELinux corruption
Links to More Info: BT1273025
Component: F5OS-A
Symptoms:
Virt-handler pod is crashing upon downgrading from F5OS-A 1.4.0 to F5OS-A 1.3.2, and a tenant is stuck in pending state.
Conditions:
Configure TACACS server-group on a non-default port (that is, other than port 49) and downgrade from F5OS-A 1.4.0 to F5OS-A 1.3.2.
Impact:
Tenant becomes stuck in pending state.
Workaround:
Two workarounds:
1. Configure standard port (49) for the TACACS server instead of a non-standard port. Using the standard port should not trigger these issues. Releases older than F5OS-A 1.4.0 do not correctly support any port other than 49 for the TACACS server.
2. Fix SELinux policy on the appliance:
a. cp selinux module from /usr
cp /usr/etc/selinux/targeted/active/modules/400/f5_appliance to /etc/selinux/targeted/active/modules/400/f5_appliance
b. Reboot the device
reboot
Fix:
Enforce closure of non-standard port every time configuration is updated or system is shut down. This avoids leaving ports open for which SELinux may not have exceptions.
Note this does not address the non-standard port in older releases when downgrading. Non-standard ports for TACACS are still not properly supported in the older release.
1273021-1 : ISOs imported with regex special characters in their names are getting deleted★
Links to More Info: BT1273021
Component: F5OS-A
Symptoms:
Downgrade/upgrade issues are seen when upgraded ISO has special characters in the file name
If an F5OS-A ISO with a filename containing 'special characters' ('+ , * , ? , ^ , $ , ( , ) , [ , ] , { , } , | , \') is imported, and the system is downgraded/upgraded to that version, it can result in the upgrade failing and the ISO being automatically removed.
Conditions:
1. Download and import an ISO with a 'special character' in its name, example 'F5OS-A-1.5.0-*.iso'.
2. Attempt an upgrade to the imported ISO version.
3. Upgrade will fail.
Impact:
An upgrade to a version of software marked as successfully imported can fail unexpectedly, requiring manual intervention to recover the system.
Docker container services will not come up.
Workaround:
1. Before performing a platform software upgrade, compare versions referenced by the "show system image" ConfD CLI command with the names of files present in the "/var/import/staging” directory.
If the iso is not present in /var/import/staging but it is shown in "show system image" command output, then import again to "/var/import/staging”.
2. If there is any iso file with a name containing a special character present in "/var/import/staging” remove that version of platform software and re-import it by re-downloading the file with a name that does not include special characters. You may then attempt upgrade.
3.In-order to remove that iso file with a name containing a special characters use below command.
appliance-1(config)# system image remove iso <iso version>
4.In scenarios where above command fails or not possible to use above command
please follow below procedure to delete the image.
* login to the device using root.
* chattr -i "/var/import/staging/<iso with special characters>”
* rm -rf "/var/import/staging/<iso with special characters>”
Incase downgrade or upgrade failure is already happened, because this issue,
follow these steps to recover the system:
1.Download another copy of the ISO with a proper name to /var/import/staging.
2.Wait for five minutes for it to import. if confd is unavailable, you can check the logs in /var/log/sw-mgmt.debug for import status.
3.Once the import is complete, reboot the system. This should recover the system.
Fix:
Import of ISO with special characters is blocked.
1273017-1 : LACPD restarts when changing aggregation lag-type through configuration utility webUI
Links to More Info: BT1273017
Component: F5OS-A
Symptoms:
The Link Aggregation Control Protocol Daemon (LACPD) will restart. An LACP aggregation's interface can be permanently down, restricting traffic from passing on that interface.
Conditions:
-An aggregation interface's lag-type is set to static through configuration utility.
Impact:
One or more physical interfaces associated with an LACP aggregation can be erroneously marked down indefinitely, causing either degraded performance, or complete traffic failure.
Performance degradation may not occur, but the LACPD process will always restart.
Workaround:
- Toggle any affected interface to disable and then back to enable.
- Toggle any affected aggregation interface to static and then back to LACP.
- Reboot the system.
Fix:
LACPD will not restart when an aggregation is configured to static through the configuration utility. Few warnings can be logged when this operation occurs. These warnings can be ignored if seen while changing an aggregation's lag-type through configuration utility.
1271973-2 : Disabling 1G/10G BaseT interface in F5OS does not make the link down on the peer port
Links to More Info: BT1271973
Component: F5OS-A
Symptoms:
An external switch connected to one of the 1G/10G BaseT interfaces will show link-up even when the interface is disabled in F5OS.
Conditions:
When a 1G/10G BaseT interface is connected to an external switch and is disabled in F5OS.
Impact:
The external switch link-up is misleading since the interface is actually disabled on the F5 system.
Fix:
Disabling 1G/10G BaseT interfaces in F5OS now brings the link down.
1270837-2 : The Account Locked field on the Edit User page does not lock out users nor display correct locked status
Links to More Info: BT1270837
Component: F5OS-A
Symptoms:
Changing the Account Locked field on the Edit User page does not lockout a user, nor does the field correctly represent the locked status of a user.
Conditions:
Using the Account Locked field in the webUI.
Impact:
Users are allowed to log in even if the Account Locked status is changed to True and the account is truly locked.
Users are unable to log in even if the Account Locked status is changed to False, and the account is truly unlocked.
Workaround:
To lock or unlock a user, use the CLI to set the user's expiry date to 1 for locked and -1 for unlocked.
Following is an example:
Locked
(config)# system aaa authentication users user <username> config expiry-date 1
(config)# commit
Un-locked
(config)# system aaa authentication users user <username> config expiry-date -1
(config)# commit
Fix:
On the webUI the "Account Locked" widget will be replaced by the "Expiry Status" configuration which will allow locking the user in a similar fashion as the CLI.
1270473-3 : On firmware upgrade from CLI, wrong console message displayed
Links to More Info: BT1270473
Component: F5OS-A
Symptoms:
When the firmware upgrade command from ConfD CLI is executed, on success it displays the below message:
Result FIPS firmware has been set successfully. Please reset HSM to reflect the update!
The HSM reset does a factory reset and wipes the HSM.
Conditions:
On firmware upgrade from ConfD CLI, the wrong console message is displayed to the user.
Impact:
If HSM resets, it factory resets the HSM and wipes it.
Workaround:
Do not reset HSM; instead reboot the system to get the new firmware reflected.
Fix:
N/A
1270309-1 : Audit.log may log incorrect username initially for users logging into the CLI, remotely-authenticated users may see hostname in prompt reported as "appliance-1", and remotely-authenticated LDAP users may experience lengthy delays when authenticating
Links to More Info: BT1270309
Component: F5OS-A
Symptoms:
The audit log may initially show the incorrect username when users log in to the CLI:
For example:
msg="audit" user="[one username]/[number]" cmd="created new session via cli from 192.0.2.1:56166 with ssh".
msg="audit" user="[one username]/[number]" cmd="CLI 'show system state hostname'".
msg="audit" user="[one username]/[number]" cmd="CLI done".
msg="audit" user="[one username]/[number]" cmd="terminated session (reason: normal)".
msg="audit" user="[actual username]/[another number]" cmd="created new session via cli from 192.0.2.1:56166 with ssh".
msg="audit" user="[actual username]/[another number]" cmd="CLI 'exit'".
msg="audit" user="[actual username]/[another number]" cmd="terminated session (reason: normal)".
Or:
confd[121]: audit user: [tenant name]/[number] assigned to groups: admin
confd[121]: audit user: [tenant name]/[number] CLI done
confd[121]: audit user: [tenant name]/[number] terminated session (reason: normal)
confd[121]: audit user: test_user/[number] assigned to groups: admin
If role GID mapping is configured, remotely-authenticated users may see the hostname reported in the prompt as "appliance-1", rather than the correct hostname. For instance:
User f5osadmin last logged in 2023-10-01T01:02:03.123456+00:00, to appliance-1 from 192.0.2.1 using cli-ssh
f5osadmin connected from 192.0.2.1 using ssh on appliance-1.chassis.local
appliance-1#
Remotely-authenticated LDAP users may experience lengthy delays when authenticating via SSH, particularly if one or more of the following are true:
- the LDAP server has a large number of groups
- the LDAP server has many users in groups
- there is noticeable latency between the F5OS system and the LDAP server
Conditions:
When trying to use remote authentication, multiple user accounts have the same UID (user identifier). The user IDs may overlap between multiple remote users, or between remote users and local users.
Impact:
The audit.log will show an incorrect username for the first few entries.
The CLI prompt may display the generic hostname "appliance-1".
Workaround:
To avoid the audit.log reporting an incorrect username, ensure all user accounts have unique user IDs.
If that is not practical, or to work around the other symptoms of this issue, the following procedure will work around the issue; this procedure will be reverted by any software version changes.
1. Log into the rSeries appliance as root
2. Put the script below into /etc/cron.hourly, as a file named "ID1270309-workaround", and then mark it executable ("chmod 755 /etc/cron.hourly/ID1270309-workaround").
===
#!/bin/bash
set -Eeuo pipefail
# f5_confd_cli from different versions of F5OS-A
# 1.5.0 / 1.5.1
# 1.5.1 with the fix for ID1301837
MATCHING_CHECKSUM=( "5496b29958666ab7eeb44e1dbc78afb4c99a08d5" "a5d4a6928fb77fd089ed8289f1162220d30e2c8c" )
# The same file, with the patch below applied to it.
MODIFIED_CHECKSUM=( "37ab85644d33f1fdd1724e284aa694c897a4e898" "8d552eb9f79853dacf762d9ee21c06cc950383f3" )
FILE=/var/lib/controller/f5_confd_cli
CHECKSUM=$(sha1sum "$FILE" | awk '{print $1}')
if [[ "${MATCHING_CHECKSUM[@]}" = *"$CHECKSUM"* ]]; then
:
elif [[ "${MODIFIED_CHECKSUM[@]}" = *"$CHECKSUM"* ]]; then
# Already modified. Nothing to do
exit 0
else
echo >&2 "f5_confd_cli is in unknown state, not modifying."
exit 0
fi
patch -p1 "$FILE" << 'EOF'
--- /var/lib/controller/f5_confd_cli.ID1270309.orig 2023-09-05 15:35:44.651749231 -0700
+++ /var/lib/controller/f5_confd_cli 2023-09-05 15:37:08.894286756 -0700
@@ -180,16 +180,11 @@
echo "System Time: $date"
fi
-# Read the hostname from /system/state/ if it exists,
-# otherwise default to the hostname
-hostname_cli_out=$(echo "show system state hostname" | /var/lib/controller/confd_cli -N)
-
-hname=${HOSTNAME}
-if [[ ! -z "${hostname_cli_out}" ]]; then
- if [[ "$hostname_cli_out" == *"system state hostname"* ]]; then
- hname=$(echo ${hostname_cli_out} | awk '{print $(NF)}')
- fi
+if [ -r /etc/f5_sys_hostname/env ]; then
+ . /etc/f5_sys_hostname/env
fi
+hname=${SYS_CONFIG_HOSTNAME:-$HOSTNAME}
+
if [[ -z "${supplementary_gids}" ]]
then
exec /var/lib/controller/confd_cli -C -H ${hname} -u ${USER} --gid "${primary_gid}"
EOF
===
This script will check and potentially update the login script once an hour to apply the workaround. After a system reboot or the system_manager docker container restarts, there is a potential period of up to an hour before the workaround is reapplied.
This workaround will also only function for specific versions of F5OS software; currently, only for F5OS-A 1.5.0 and F5OS-A 1.5.1.
1269989-2 : tcam-manager may get stuck using 100% CPU
Links to More Info: BT1269989
Component: F5OS-A
Symptoms:
After running a QKView or tcam-dump by itself, tcam-manager does not clean up the diagnostic socket, which results in a tight loop and pegging the CPU at 100% utilization. This in turn starves other platform processes (such as dma-agent), which causes performance degradation.
Conditions:
A QKView or tcam-dump, which is included in QKView, is run.
Impact:
Performance degradation.
Workaround:
The issue can be avoided by not running QKView.
Fix:
After tcam-dump completes, the corresponding socket is properly removed.
1267253-2 : LDAP shadowExpire attribute not honored
Links to More Info: BT1267253
Component: F5OS-A
Symptoms:
When using LDAP authentication, usage of the shadowExpire and related attributes will not enforce expiration on the F5 device.
Conditions:
LDAP authentication is configured. LDAP shadowExpire, shadowMax, and related attributes are set such that the user should be expired.
Impact:
User with expired attributes can log into F5 device.
Workaround:
Either remove the user from groups with roles that allow access to the F5 device (for example, F5OS admin role gidNumber) or delete the user.
1267205-1 : Status field in "show system image" reports error when upgrading to 1.5.0★
Links to More Info: BT1267205
Component: F5OS-A
Symptoms:
Although patch ISOs are removed from the system, services filed still show entry for base service with status as error.
Ex:
VERSION IN
SERVICE STATUS DATE SIZE USE TYPE
------------------------------------------------------
1.3.0-8327 error 1 1 false
1.1.0-7645 error 1 1 false
Conditions:
This occurs after upgrading from a patched version.
Impact:
There is no impact to the system.
Workaround:
Workaround #1: This is for the issue when you have removed older images from prior to the upgrade to F5OS-A-1.5.0.
1. Remove all service entries which status shows as "Error" in show command from the /var/import/import.json file and save and close it.
ex:
{
"date": "2022-11-06",
"platform": "R5R10",
"status": "100",
"source": "/var/export/chassis/import/preserved_sources/F5OS-A-1.3.1-8863.R5R10.CANDIDATE.img",
"version": "1.3.0-8327",
"component": "services",
"port": "2006",
"size": 2519765504,
"error": "",
"subcomponents": []
},
2. Do any of the steps
- systemctl restart sw-mgmt.service
- docker restart system_image_agent
or
reboot the system
3.
Now the system will remove the error flag from "show system image" output and we can delete these services from CLI/webUI.
Workaround #2:
To avoid such error in "show system image" output, first upgrade to 1.5.0 and then remove the older ISO (1.3.2,1.3.1,1.1.1 etc).
1266197-2 : CVE-2022-4254 sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
Links to More Info: K000136157, BT1266197
1263941-2 : CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user
Links to More Info: K000132667, BT1263941
1256897-4 : Deleting an ECDSA curve using the CLI takes a while to restart the http-server with the default RSA certificate.
Links to More Info: BT1256897
Component: F5OS-A
Symptoms:
After setting a valid ECDSA curve type:
prime256v1 X9.62/SECG curve over a 256 bit prime field
secp384r1 NIST/SECG curve over a 384 bit prime field
and storing into tls the self-signed certificate the GUI will show the certificate info for this URL.
Going into the CLI and deleting the key and certificate:
su admin
config
no system aaa tls config certificate
no system aaa tls config key
commit
removes the ecdsa certificate and key and http-server is restarted with the default created rsa key and certificate.
However, the GUI still has the deleted certificate and continues to use it despite doing a refresh or attempting to log in from another browser window.
Looking at what happens under the covers, it shows that the ecdsa key and certfiicate are deleted and that httpd was restarted (all have new PID's).
The problem seems to happen with ecdsa curves only and might be explained by either of the following:
On linux operating systems, a file isn't completely deleted until the last referring program releases it.
The browser caches the certificate if it's type ecdsa and does not release that cache right away.
We notice that using the default rsa key and certificate seems to fail when the ecdsa is deleted, but after a 60 second timeout, the http-server recovers and everything seems back to normal. I could take a couple timeouts, meaning that two minutes must go by.
Conditions:
After selecting an ECDSA key type (for curve type prime256v1 or secp384r1) and connecting successfully, the key and certificate are deleted from ConfD, resulting in having the http-server use a default created RSA key and certificate.
Impact:
This can be a bit concerning, in that one expects the certificate to be replaced immediately once the key and certificate are removed. From an operational perspective, the flow does not seem to be affected as the webUI continues to work. Eventually the certificate type will no longer be the ECDSA type, but this can take a few minutes, perhaps longer.
Workaround:
To hasten the fix, one can do: docker restart http-server, which usually fixes the issue right away, or a reboot will also accomplish this.
1256437-1 : Interface with a default route with gateway is NOT available
Links to More Info: BT1256437
Component: F5OS-A
Symptoms:
Without default interface, k3s will fail to come up.
Symptoms: Interface with a default route with gateway is NOT available.
Conditions:
Without default interface, k3s will fail to come up.
Impact:
K3s will be down.
Workaround:
rm -f /etc/NetworkManager/system-connections/default-intf
and reboot
Fix:
Delete the file - /etc/NetworkManager/system-connections/default-intf
and reboot.
1253713-3 : CVE-2020-15999 freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png
Links to More Info: K000133070, BT1253713
1252445-2 : QKView is collecting iptable dump only for filter table but not for raw, mangle, and nat
Links to More Info: BT1252445
Component: F5OS-A
Symptoms:
When QKView is collected on F5OS, it is displaying data for only filter table but not for nat/mangle/raw in container network.
Conditions:
Collect QKView on F5OS using system diagnostics QKView capture.
Impact:
No impact; iptable dump for filter table is already present.
Workaround:
N/A
Fix:
Updated QKView file to include required iptable commands.
1252377-4 : VXLAN-GPE and GENEVE are disabled by default when software is upgraded from F5OS-A 1.3.0 build to F5OS-A 1.4.0★
Links to More Info: BT1252377
Component: F5OS-A
Symptoms:
When r10000 or r5000 Series hardware is running with F5OS-A 1.3.0, the default settings for VXLAN-GPE and GENEVE are enabled, and hardware disaggregation support for these tunnel protocols is enabled without any explicit configuration.
If the software is upgraded from F5OS-A 1.3.0 to F5OS-A 1.4.0, these protocols will be disabled, and hardware disaggregation is disabled. It is required to enable these two protocols explicitly in the configuration to enabled them in the hardware.
Conditions:
If VXLAN-GPE and GENEVE tunnels are used in the deployment with F5OS-A 1.3.0 software version without any explicit enabled configuration for these two tunnels, and software upgraded to F5OS-A 1.4.0 or later.
Impact:
Hardware disaggregation support for VXLAN-GPE and GENEVE will be disabled if software is upgraded from F5OS-A 1.3.0 to F5OS-A 1.4.0 or later when these two tunnels are using default configuration to enable them.
Workaround:
Use explicit tunnel settings to enable VXLAN-GPE and GENEVE in F5OS-A 1.3.0, or enable these two protocols explicitly after software upgrade from F5OS-A 1.3.0.
Fix:
VXLAN-GPE and GENEVE are disabled in default global configuration and advised to use explicit tunnel configuration settings to enable hardware disaggregation support.
1251981 : Speed on webUI Interfaces screen is empty for 1GB
Links to More Info: BT1251981
Component: F5OS-A
Symptoms:
When interface speed is 1GB, the speed column on this screen is blank. The Edit Interfaces screen has the same issue.
Conditions:
Interface speed is set to 1GB.
Impact:
Speed column will be blank, so user will not see the actual speed.
Workaround:
Use the F5OS CLI to view the interface speed when it is set to 1GB.
Fix:
Speed column is now populated correctly on the Interfaces screen.
1251129-1 : Flannel network needs to be in cluster CIDR
Links to More Info: BT1251129
Component: F5OS-A
Symptoms:
By default, flannel uses CIDR 10.244.0.0/16, which was left unmodified. As a result, traffic arriving at the management interface from IP addresses in this network range may not match "allowed-ip" rules as expected.
Conditions:
Any traffic coming in from a source IP range of 10.244.0.0/16 is masqueraded in F5OS-A.
Impact:
System "allowed-ip" rules do not function as expected when the source IP address is within 10.244.0.0/16.
Workaround:
None
Fix:
Fixed in F5OS-A 1.6.0.
1250901-2 : On rSeries FIPS system live upgrade, cavium_n3fips (liquidsec_pf_vf driver) may fail to come into operational state
Links to More Info: BT1250901
Component: F5OS-A
Symptoms:
After a reboot of the system in live upgrade, tenants that were running earlier might not change to a running state. This is due to the HSM board driver stuck in SAFE_STATE instead of OPERATIONAL_STATE.
In some cases, the driver changes to an operational state after some amount of time (approximately 10 minutes). But this time might vary upon detection of reset/link failure in the hardware. In some other systems, the driver becomes stuck in SAFE_STATE indefinitely.
Conditions:
Live upgrade/reboot of the rSeries FIPS system with F5OS-A.
You may observe the below logs in dmesg-
[ 964.105021] liquidsec_pf_vf_driver 0000:ca:00.0: We might have a link issue... resetting
[ 964.113688] liquidsec_pf_vf_driver 0000:ca:00.0: RESETTING FIRMWARE... CAUTION
Impact:
Running tenants goes to pending state when this issue occurs in a live upgrade.
Workaround:
Check contents of cavium_n3fips file as shown below.
[appliance]# cat /proc/cavium_n3fips/driver_state
HSM 0:OPERATIONAL_STATE
If the driver changes to an operational state, perform
"docker restart fips-support-pod" to help in recovering.
But if the driver state is still "HSM 0:SAFE_STATE", you may need to perform a power cycle reboot (but this will not guarantee recovery).
Fix:
N/A
1249773-2 : QKView may fail to collect all files for platform-monitor container
Links to More Info: BT1249773
Component: F5OS-A
Symptoms:
Very occasionally, QKView view will have a conflict collecting round-robin database (RRD) files in the platform monitor container. The qkview-collect routine may terminate unexpectedly as a result.
Conditions:
QKView capture request happens coincidentally to round-robin database update.
Impact:
RRD files may not be collected.
Workaround:
Rerun QKView.
Fix:
This will be fixed in a future release.
1240749-1 : F5OS systems send incomplete DDoS stats response to the tenants
Links to More Info: BT1240749
Component: F5OS-A
Symptoms:
BIG-IP tenants on F5OS systems receive incomplete/corrupted DDOS stats response, which leads to TMM crash.
Conditions:
Undetermined circumstances on a BIG-IP tenant with AFM provisioning.
Impact:
TMM crashes on the tenant, which affects application traffic. Traffic disrupted while TMM restarts.
Workaround:
None
Fix:
TMM no longer crashes.
1240565-2 : Not allowing special characters "/*!<>^,/" in SNMP community/user/target name
Links to More Info: BT1240565
Component: F5OS-A
Symptoms:
Currently, we are allowing all characters to configure SNMP community/target/user. Because of that someone can use this configuration to inject script and system can be compromised.
Conditions:
Try to configure SNMP community/target/user with below command:
r10900-1(config)# system snmp communities community <script>alert(1)</script config security-model v2c
r10900-1(config-community-<script>alert(1)</script)# commit
Commit complete.
r10900-1(config-community-<script>alert(1)</script)#
r10900-1# show running-config system snmp
system snmp engine-id config value mac
system snmp communities community <script>alert(1)</script
config security-model [ v2c ]
Impact:
We are allowing all characters to configure SNMP community/target/user. Because of that someone can use this configuration to inject script and system can be compromised.
Workaround:
N/A
Fix:
We are restricting special characters /*!<>^,/ (identified as invalid input) as SNMP community/target/user name configuration.
Note: Upgrade will fail if user already has SNMP configuration with restricting special characters /*!<>^,/
1239325 : Issue when Management IP address is configured to have public internet access on F5OS
Links to More Info: BT1239325
Component: F5OS-A
Symptoms:
The F5OS webUI allows web crawlers access to all content when the Management IP address is configured to have public internet access.
Conditions:
If the Management IP address is configured to have public internet access.
Impact:
This impedes the ability to satisfy internal security compliance mandates.
Workaround:
To mitigate the issue, you can manipulate the contents of the robots.txt file inside the webUI container as demonstrated below:
$ ssh root@10.238.160.60
root@10.238.160.60's password:
[root@appliance-1 ~]# docker exec -it vanquish-gui bash
[root@d6303361e100 /]# cd /app/build
[root@d6303361e100 build]# echo "User-agent: *" > robots.txt
[root@d6303361e100 build]# echo "Disallow: /" >> robots.txt
[root@d6303361e100 build]# cat robots.txt
User-agent: *
Disallow: /
[root@d6303361e100 build]# exit
exit
[root@appliance-1 ~]# exit
logout
Connection to 10.238.160.60 closed.
Fix:
Robots.txt now disallows web crawlers access to any content.
1236857-1 : F5OS OID SNMPv2-MIB::sysDescr provides meaningless information for system controller
Links to More Info: BT1236857
Component: F5OS-A
Symptoms:
After setting up snmpwalk on older version and live upgrading to another version, the snmpwalk is still showing older service version.
Conditions:
1. configure SNMP
2. upgrade system with live upgrade
3. check system version using SNMPv2-MIB::sysDescr (it will be pointing to older version)
example:
SNMPv2-MIB::sysDescr.0 = STRING: Linux 3.10.0-1160.62.1.F5.1.el7_8.x86_64 : Appliance services version <older_version>
Impact:
sysDescr will be displaying older version.
Workaround:
N/A
Fix:
This issue is fixed in latest release.
1234049 : The Add/Edit tenant deployment screen on the r4600 webUI does not have the option for 12 vCPUs in the vCPUs dropdown
Links to More Info: BT1234049
Component: F5OS-A
Symptoms:
The vCPUs dropdown does not have 12 as an option in the Add/Edit tenant deployment screen on the r4600 webUI.
Conditions:
While adding or editing a tenant on the r4600 system via webUI.
Impact:
The user cannot add or edit a tenant with 12 vCPU cores on the webUI.
Workaround:
Users can add/edit a tenant with 12 vCPU cores from the CLI.
Fix:
The webUI will have an additional option for '12' in the vCPUs dropdown thus allowing the user to deploy a tenant with 12 vCPU cores.
1232369 : Intel Microcode update
Links to More Info: BT1232369
Component: F5OS-A
Symptoms:
Intel Microcode update was found to fix an internal regulator power issue. No workaround; requires BIOS update.
Conditions:
Intel Microcode earlier than 0d000389 in the BIOS.
Impact:
Unknown
Workaround:
Upgrade BIOS that includes the new microcode 0d000389 from Intel.
Fix:
BIOS version 2.01.134.1 has been updated from vendor with the updated microcode from Intel.
1232309 : CVE-2020-10754: nmcli did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings
Links to More Info: K000132761, BT1232309
1231485-7 : CVE-2020-17541-libjpeg-turbo vulnerability
Links to More Info: K000140960
1231357 : Unexpected reboot might occur on r5000/r10000 Series
Links to More Info: BT1231357
Component: F5OS-A
Symptoms:
An unexpected operating system reboot might occur on r5000/r10000 Series.
After the system reboots, in the /var/crash/ directory there will be a new directory created that is named with a timestamp corresponding to the reboot. In that new directory, a file vmcore-dmesg.txt is available with the following error message:
CPU 0: Machine Check Exception: 5 Bank 4: ba00000056000402
Conditions:
Unexpected system reboot.
Impact:
When the reboot occurs, the entire system will reboot and all tenants will stop processing traffic until the reboot is complete. The system will operate normally after the reboot.
Workaround:
None
Fix:
This issue has been corrected.
1230609 : Neighbor interface description is not updated in LLDP neighbor details
Links to More Info: BT1230609
Component: F5OS-A
Symptoms:
Port Description TLV is not displayed under LLDP interface neighbors.
Conditions:
1) enable LLDP on device and on switch
2) enable port description TLV
3) set port description on interface in switch side
Impact:
No impact.
Workaround:
N/A
Fix:
Fixed code to display port description.
1229465-3 : QKView is not collecting core files in /var/crash
Links to More Info: BT1229465
Component: F5OS-A
Symptoms:
QKView was designed to collect core files in /var/core only. The operating system kernel can create core files in /var/crash. SEs need to know about these files.
Conditions:
OS kernel creates a core file.
Impact:
Core file not collected by QKView.
Workaround:
Core file can be manually copied from /var/crash.
Fix:
QKView takes a directory listing from /var/crash and collects core files in that directory.
1229449-1 : Username is not logged on rSeries appliance when webUI authentication fails
Links to More Info: BT1229449
Component: F5OS-A
Symptoms:
When a user tries to log in via webUI and provides the wrong credentials, the username is not getting logged.
Conditions:
When a user tries to log in via webUI and provides the wrong credentials.
Impact:
Unable to see the user name for whom authentication has failed.
Fix:
N/A
1226505-2 : Average transactions per second impacted in certain cases
Links to More Info: BT1226505
Component: F5OS-A
Symptoms:
There is a reduction in http/https average transactions per second for some file sizes when ASM is configured on BIG-IP tenant on R2000 series.
Conditions:
BIG-IP config: virtual server with asm_rw policy attached to it; virtual server with profiles http, tcp, and websecurity attached to it (visual snippet is at the end of high level details).
CPU: 95-97%
simulated users: 1536
The traffic involved in testing ASM is close to real world traffic conditions.
Impact:
Reduction in average transactions per second when traffic is run for a specified duration with 1536 simulated users.
Impact is seen for http traffic specific to 32kb and 5kb file sizes.
Workaround:
N/A
Fix:
N/A
1226429 : "DEBUG cannot reply twice on the same call" log reporting repeatedly
Links to More Info: BT1226429
Component: F5OS-A
Symptoms:
When the snmpget operation is performed on IF-MIB, the message "DEBUG cannot reply twice on the same call" appears in /var/log/message. The issue is that the DEBUG is enabled in one of the services container so this DEBUG message is logging in /var/log/message.
Conditions:
One of the reproduction steps is to perform the snmpget operation on IF-MIB.
Impact:
No known impact on the functionality. They are DEBUG messages only.
Workaround:
No workaround. The debug messages stops when the snmpget operation is completed.
Fix:
Removed unwanted debug enable from the service container.
1225989-2 : TACACS users only able to access CLI, not webUI
Links to More Info: BT1225989
Component: F5OS-A
Symptoms:
A TACACS user with either admin or operator privilege is unable to log onto the webUI, but can get access through the CLI. This was found to be due to an internal file linking error.
Conditions:
Have a correctly configured TACACS authenticated user access the webUI.
Impact:
The login will not be successful, and an "Authentication failed" message will be displayed. The webUI will be inaccessible.
Workaround:
N/A
Fix:
The file link issue has been resolved, and the problem no longer exists.
1225981-1 : Files greater then 1000 MiB are truncated in QKView
Links to More Info: BT1225981
Component: F5OS-A
Symptoms:
QKView is unable to collect an untrunucated platform.log file that has been rotated.
Conditions:
Rotated copy of the platform.log file is greater than 1000 MiB.
Impact:
Logs are not complete in QKView making it difficult to troubleshoot issues.
Workaround:
Collect the log files manually.
1225701-1 : Filenames with special characters in /var/import/staging cause upgrade to fail
Links to More Info: BT1225701
Component: F5OS-A
Symptoms:
Coping images with special characters in the filename to /var/import/staging causes the sw-mgmt service to exit. The system is unable to change versions.
Conditions:
Copy or import an image with special characters in the filename to /var/import/staging. Then, try to upgrade.
Impact:
sw-mgmt service is exiting, and the system will not upgrade.
Workaround:
Remove the image the special characters using the commands below in a bash prompt:
chattr -i /var/import/staging/<iso with special characters>
rm -rf /var/import/staging/<iso with special characters>
Then, restart sw-mgmt.service:
systemctl restart sw-mgmt.service
Fix:
We have modified sw-mgmt to remove any images containing special characters.
1217169-2 : Disk full: Latest ISO is not getting imported★
Links to More Info: BT1217169
Component: F5OS-A
Symptoms:
Not able to import images because /var/export/chassis LVM goes to read-only mode when the memory usage of this LVM exceeds 50%.
The iso image is reported as saved but not imported.
This LVM is created as VDO (virtual data optimizer) volume, twice the size of the physical partition size, so 50% of the LVM size is equal to 100% of the size of the underlying physical device (partition), on which this LVM is being created.
When the LVM usage reaches more than 50% of LVM size, the LVM metadata is corrupted, causing this issue.
Conditions:
The issue is seen when usage of the LVM /var/export/chassis reaches around 50% by importing more than 12 F5OS-A images on an rSeries 2xxx/4xxx device.
Impact:
Not able to import images once the LVM /var/export/chassis goes to read-only mode.
Workaround:
Remove older images from /var/export/chassis/import/iso/ using command below before importing/copying new images.
appliance-1(config)# system image remove iso <old/unused iso version>
or
If it is not possible to delete the images using above command
please follow below steps.
chattr -i /var/import/staging/<old/unused iso>
rm -rf /var/import/staging/<old/unused iso>
In case the issue is seen (/var/import/staging/ becomes read only) the only way to recover the system is perform either pxeboot or usb install on the system.
1215917 : webUI failed to load when downgrading from 1.5.0 to 1.3.1 with self-signed certificate with encrypted RSA key type
Links to More Info: BT1215917
Component: F5OS-A
Symptoms:
webUI fails to load.
Conditions:
If the self-signed certificate is enabled with encrypted-RSA/ECDSA, and the system is downgraded to lower versions than 1.5.0
Impact:
webUI fails to load.
Workaround:
Remove the self-signed encrypted certificate before downgrading to lower versions.
Fix:
Added code changes to restrict the downgrade to lower versions if encrypted RSA/ECDSA certificate is available.
1211861 : Configured input values of IP address fields reset to default upon switching the protocol
Links to More Info: BT1211861
Component: F5OS-A
Symptoms:
IP address fields are reset to default values.
Conditions:
When the user changes the protocol and switches back to the previously selected protocol via the "Address" field on the webUI.
Impact:
Values of IP address fields are lost as they are reset to default values.
Workaround:
Users can cancel or navigate away from the screen. When they visit the management interface screen again, the configured values will appear.
Fix:
The "Address" field in the Management Interface section has been removed, and all the IPv4 and IPv6 address fields are always displayed, thereby eliminating the need to switch protocols.
We have added 'X' buttons adjacent to the address fields that can be leveraged to put in default values in case the user does not want to configure the fields for a particular protocol.
1211777 : Configured input values of IP address fields reset to default upon switching the protocol
Links to More Info: BT1211777
Component: F5OS-A
Symptoms:
IP address fields are reset to default values.
Conditions:
When the user changes the protocol and switches back to the previously selected protocol via the "Address" field on the webUI.
Impact:
Values of IP address fields are lost as they are reset to default values.
Workaround:
Users can cancel or navigate away from the screen. When they visit the management interface screen again, the configured values will appear.
Fix:
The "Address" field in the Management Interface section has been removed, and all the IPv4 and IPv6 address fields are always displayed, thereby eliminating the need to switch protocols.
We have added 'X' buttons adjacent to the address fields that can be leveraged to put in default values in case the user does not want to configure the fields for a particular protocol.
1211673-2 : Default tenant disk size is based on tenant image type
Links to More Info: BT1211673
Component: F5OS-A
Symptoms:
There is no impact on functionality.
Previously, default tenant disk size was 77GB regardless of image type.
After the fix:
T1 type image - 22GB
T2 type - 45GB
T4 - 142GB
ALL - 82GB
Based on image type, default storage size will be used.
Conditions:
Tenants are created with default disk size of 77Gb although their image size is different.
Fix: create tenant disk based on image type.
Impact:
No functionality impact
Workaround:
No Functionality impact.
Fix:
No Functionality impact.
1211025 : Firmware update interrupted during OS install★
Links to More Info: BT1211025
Component: F5OS-A
Symptoms:
Firmware update can be interrupted by docker container issues.
Conditions:
Random container issue restarts all containers.
Impact:
If firmware is being updated in that moment, the firmware update will fail and it could cause problems to normal system operation.
Workaround:
Ask the support team to update the LOP firmware.
Fix:
Docker container failure handles routine checks if firmware is being updated and waits until the update is done before handling the failure.
1207485-1 : LACP daemon restarts when changing lag-type of the aggregation
Links to More Info: BT1207485
Component: F5OS-A
Symptoms:
LACP daemon restarts. The system will be unable to process LACPDUs until LACP daemon starts up again.
Conditions:
The issue occurs from changing the lag-type of an aggregation interface that does not have an associated LACP interface.
Impact:
All LACP link aggregations may go down and be unable to process traffic for a short time. The down time, if it occurs, should be less than a few seconds.
Workaround:
Only change an aggregation's lag-type while an associated LACP interface exists.
Fix:
LACP daemon will not restart when changing an aggregation's lag-type while an associated LACP interface does not exist.
1207189-3 : CVE-2022-38178 in bind-license-32:9.11.4-26.P2.el7_9.7
Links to More Info: K000137229, BT1207189
1207185-2 : CVE-2022-38178 in bind-export-libs-32:9.11.4-26.P2.el7_9.7
Links to More Info: K000137229, BT1207185
1207101-6 : CVE-2019-13509 docker: Docker Engine in debug mode may sometimes add secrets to the debug log leading to information disclosure
Component: F5OS-A
Symptoms:
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
Conditions:
Docker Engine (CE or EE) is running in debug mode on a version prior to the fixed release
Impact:
Secrets may be inadvertently written to the Docker debug log
Workaround:
NA
Fix:
Upgraded the version of github.com/docker/distribution to v2.8.2+incompatible.
1205409-2 : Cannot export or download files from diags/shared/tcpdump path
Links to More Info: BT1205409
Component: F5OS-A
Symptoms:
The diags/shared/tcpdump path gives access to the tcpdump files captured for system diagnostics. However, these files could not be downloaded from the webUI to the local system.
Conditions:
- User generates a tcpdump file for system diagnostics
- User navigates to the diags/shared/tcpdump path in the webUI and tries to download file, resulting in an error
Impact:
Unable to download tcpdump files from diags/shared/tcpdump path in the webUI. Hence, a user cannot access these files from the webUI.
Workaround:
Create /var/docker/config/platform.override.yml with these contents:
version: '2.1'
services:
http-server:
volumes:
- /var/F5/system/shared/tcpdump:/var/shared/tcpdump
Then, restart platform-services.
Fix:
User is now able to download and export files from diags/shared/tcpdump path to any required destination without any errors.
1205345-5 : RADIUS remote authentication uses internal system IP address as system identifier in requests
Links to More Info: BT1205345
Component: F5OS-A
Symptoms:
When configured for RADIUS remote authentication, the F5OS systems send internal system IP address as Network Access Server (NAS) system identifier (NAS-IP-Address or NAS-IPv6-Address), rather than a system management IP.
On VELOS systems, the NAS-IPv6-Address will be a link-local IPv6 address in fe80::/64.
On rSeries appliances, the NAS-IP-Address will be an address in the internal address range (RFC6598 by default), e.g. 100.65.60.2.
Conditions:
RADIUS remote authentication for system users.
Impact:
RADIUS authentication servers may ignore or reject authentication requests due to an unknown system identifier in the requests.
Workaround:
None.
1204985-2 : The root-causes of F5OS upgrade compatibility check failures are hidden in /var/log/sw-util.log.
Links to More Info: BT1204985
Component: F5OS-A
Symptoms:
When performing a live upgrade, if the upgrade compatibility check fails, users can only see "System database upgrade compatibility check failed" error message. The applicable information about what failed is neither displayed nor shown in platform.log/velos.log.
Conditions:
1. Perforrm a live-upgrade.
2. If the upgrade compatibility check fails, users can only see "System database upgrade compatibility check failed" error message. The applicable information about what failed is neither displayed nor shown in platform.log/velos.log.
Impact:
Upgrade failure logs are not logged in platform.log/velos.log.
Workaround:
None
Fix:
This issue is fixed and displays the error scenarios in platform.log/velos.log.
1204481 : System may flap external links multiple times during startup or links may fail to come up at all
Links to More Info: K000132166, BT1204481
Component: F5OS-A
Symptoms:
When the system boots up, the interfaces may flap (go up and down) several times in quick succession before coming up and stabilizing.
In some cases, the interfaces fail to come up at all.
If a peer switch is configured to detect excessive link flaps, it may put the port in an err-disable state and prevent the link from coming up.
Conditions:
-- r5000 or r10000 Series appliance
Impact:
If the peer switch triggers a link-flap detection feature, the ports may remain offline until an administrator manually recovers the port on that switch.
Workaround:
There is no workaround for this issue on the rSeries appliance.
An administrator can mitigate this issue by doing one of the following:
- configuring the peer switch to automatically try to recover ports that are disabled for excessive link flapping
- increasing the number of link flaps required in a certain interval before the port is put in a disabled state
Fix:
Disable sending of remote-fault signaling to peer device while the system is booting up.
1204433-2 : "Appliance-mode" flag in license should not be used to enable appliance-mode
Links to More Info: BT1204433
Component: F5OS-A
Symptoms:
Appliance-mode enabled using license will not get reflected in "show tenants" CLI.
Conditions:
The issue is seen when "appliance-mode" is enabled through license.
Impact:
Appliance-mode enabled using license will not get reflected in "show tenants" CLI.
Workaround:
None
Fix:
Appliance-mode is now enforced on tenant creation.
1195561-1 : CVE-2022-3705 vim: a use after free in the function qf_update_buffer
Component: F5OS-A
Symptoms:
A use-after-free flaw was found in the qf_update_buffer function in vim. This issue allows a specially crafted file to crash a program, use unexpected values, or execute code.
Conditions:
NA
Impact:
Users might experience unexpected termination of vim or internal memory inconsistencies during quickfix buffer operations.
Workaround:
NA
Fix:
This issue has been addressed with a fix
1194881-5 : Bind vulnerabilities: CVE-2021-25220 and CVE-2022-2795
Links to More Info: K78285929
1190369 : Terminal window not reflecting configured hostname
Links to More Info: BT1190369
Component: F5OS-A
Symptoms:
The title of the terminal window does not have the configured hostname.
Currently, all open windows with root login either from PuTTY or any application display as appliance-1.
Conditions:
Connecting to the device using ssh clients like PuTTY.
Impact:
This causes difficulty for a user trying to juggle multiple open SSH sessions during a maintenance window.
1188921-1 : tcpdump not working after upgrade
Links to More Info: BT1188921
Component: F5OS-A
Symptoms:
tcpdump fails with CLI error:
errbuf ERROR:DMAA error, packets cannot be captured
tcpdump: pcap_loop: DMAA error, packets cannot be captured
Error logged:
appliance-1 tcpdumpd-manager[8]: priority="Crit" version=1.0 msgid=0x5406000000000029 msg="DMAA socket failed:" comp="connect" errno=2.
Conditions:
System upgrade has failed to properly update the configuration file, which is responsible for starting tcpdumpd_manager.
Impact:
tcpdumpd_manager will not be able to start and packets cannot be captured. tcpdumpd_manager will continue log this failure to the system log.
Workaround:
None
Fix:
Improved tcpdumpd_manager start-up routine to check for line-dma-agent socket availability.
1188053 : SSH idle-timeout support
Links to More Info: BT1188053
Component: F5OS-A
Symptoms:
There was no idle-timeout implemented for SSH session. The SSH session was not getting terminated even if it was idle for a long time.
Conditions:
There was no idle timeout for SSH session.
Impact:
SSH session will not get terminated even if it is idle for long time.
Workaround:
User must close the SSH session.
Fix:
Implemented SSH idle-timeout which is configurable from CLI/RESTCONF. The SSH session will now get terminated if it is idle for the configured idle-timeout. The default value is 0, which means no idle-timeout.
1185701-2 : 'system aaa' command in ConfD fails with "Error: application communication failure"
Links to More Info: BT1185701
Component: F5OS-A
Symptoms:
-- System fails to change password and renders system in a degraded state where user management no longer works.
-- System fails to provide proper user feedback to the user about failed password changes.
As per testing, user password change either times out or fails with application communication failure, depending on 'system aaa password-policy config retries' value.
When 'system aaa password-policy config retries 0' -> the error is "application timeout".
When 'system aaa password-policy config retries 3' -> the error is "application communication failure".
Note : On 1.5.0, the issue is fixed when 'retries' value is configured for values equal or greater than 2
Conditions:
Changing 'system aaa password-policy config retries' from the default
Impact:
F5OS user password cannot be changed.
Workaround:
Change 'system aaa password-policy config retries' back to the default:
system aaa password-policy config retries 3
Fix:
N/A
1185497-3 : Tenant health in the partition shows additional entries that are not part of the tenant configuration
Links to More Info: BT1185497
Component: F5OS-A
Symptoms:
When the admin upgrades the system software from 1.3.x to 1.5.0, the platform updates the tenant's table with additional entries that are not running as part of the tenant's original configuration.
Conditions:
Power cycle or system software upgrades from 1.3.x to 1.5.0.
Impact:
There will not be any impact on the critical functionality of the tenant, and traffic continues to work. However, it does show some unwanted information in the health which could be confusing.
Workaround:
Toggling the affected tenant's running state from "Deployed" to "Provisioned" and back to "Deployed" will fix the state of the tenant in the table.
Fix:
During the power cycle/system upgrade, the platform re-populates the tenant oper status from Openshift and publishes it to Partition. If the REST response of the tenants from Openshift is incomplete, the platform is populating entries under the wrong key/value. As a result, the partition tenant's table ends up with some unwanted entries.
It is a cosmetic issue and will not impact any tenants.
1184821 : Obscure crash in external authenticator
Links to More Info: BT1184821
Component: F5OS-A
Symptoms:
An unexpected sequence of characters in the username or password of an external login could cause a crash in the external authenticator.
Conditions:
Certain malformed usernames or passwords being used for external authentication.
Impact:
The crash in these circumstances would prevent successful login. After analysis, it was deemed there was no security risk or exposure.
Workaround:
Use usernames and passwords for authentication via SSH or webUI that conform to the device username/password requirements.
Fix:
The bug was fixed and a crash no longer occurs.
1184429-1 : Specifying "operation not supported" as an iHealth qkview description or SR number will disable iHealth uploading
Links to More Info: BT1184429
Component: F5OS-A
Symptoms:
Uploading a qkview to iHealth via the BIG-IP GUI returns an error:
"403 Forbidden, operation not supported by Supportability Server"
Conditions:
-- BIG-IP GUI
-- Uploading a qkview to iHealth
-- The case description includes the phrase "operation not supported"
Impact:
Unable to upload iHealth through the iHealth upload service on the device.
Workaround:
Do not use the phrase "operation not supported" as a description or an SR case number when uploading to iHealth.
Fix:
Fix to check for errors will scan for http error code instead of scanning the text of the http body.
1183909-2 : Python urllib3 vulnerabilities CVE-2018-20060, CVE-2019-11236, CVE-2019-11324, CVE-2018-18074
Links to More Info: K000133448, BT1183909
1181929-3 : F5OS install may partially fail, leaving system with mismatched OS and services★
Links to More Info: BT1181929
Component: F5OS-A
Symptoms:
After an attempted upgrade, administrators are unable to access the system via management UI, or log into the system as any user other than "root".
A message such as the following in the platform log:
priority=Fatal msgid=0x3501000000000021 msg=OStree rebase to version 1.2.0-10139 failed.
Conditions:
The first part of an F5OS software upgrade fails, but the system continues on and performs subsequent steps of the upgrade.
Impact:
The system may be completely inoperative, or the system may be running with different OS and services versions, which could lead to unknown problems.
On VELOS systems, "show system image" will report a failed install, and one of the system controllers may report a running OS version that is not aligned with the OS version and services versions, as can be seen on system controller 2 here:
syscon-1-active# show system image
SERVICE ISO INSTALL
NUMBER OS VERSION VERSION VERSION STATUS
----------------------------------------------------
1 1.8.0-18829 1.8.0-18829 - failed
2 1.6.1-19136 1.8.0-18829 - failed
Workaround:
If this issue occurs, contact F5 Support for assistance.
Note: This issue exists in the starting software version. It can affect upgrades to versions where this issue is fixed, i.e. upgrades to F5OS-A 1.7.0 or later or F5OS-C 1.8.0 or later.
1181721 : Add additional commands and files to QKView collection
Links to More Info: BT1181721
Component: F5OS-A
Symptoms:
There is no change in functionality. The fix adds new commands and files to QKView collection.
Conditions:
Additional commands and files are added to the QKView collection and they will be collected whenever QKView is requested.
Impact:
Additional commands and files are added to the QKView collection.
Workaround:
Only new commands and files will not be collected as part of QKView collection. Old commands and files will get collected in QKView.
Fix:
Additional commands and files are added to the QKView collection.
1167761-2 : Directory indexing enabled for management webUI
Links to More Info: BT1167761
Component: F5OS-A
Symptoms:
Directory indexing is enabled for management webUI.
Conditions:
When the management IP is followed by the name of any directory that is contained in the webUI, the build directories and file contents are visible on the browser.
Impact:
The webUI build directories and file contents are visible on the browser.
Workaround:
None
Fix:
Disabled directory indexing.
1167501-2 : java-1.8.0-openjdk: CVEs due to integer truncation and incorrect comparison during range check elimination CVE-2021-2388, CVE-2022-34169
Links to More Info: K42795243
1166149-1 : CVE-2021-27803 wpa_supplicant: Use-after-free in P2P provision discovery
Links to More Info: K000135433, BT1166149
1165973-2 : Application error while using the CLI command "show components"
Links to More Info: BT1165973
Component: F5OS-A
Symptoms:
The user receives an error message using the CLI (show components -> Error: application error) when there is a faulty sensor in the hardware.
Conditions:
When the system has the faulty sensor.
Impact:
Application error seen in the ConfD CLI while trying to execute "show components". The webUI is affected as well.
Workaround:
N/A
Fix:
We have added a check at diag-agent to not throw the application error; it will show data for the healthy components.
1162341-3 : Front panel interface status is not reported in alarms or events
Links to More Info: BT1162341
Component: F5OS-A
Symptoms:
Front panel interface flap events are not displayed in alarms or events CLI/GUI.
Conditions:
Front panel interface is down or oper-status changes.
Impact:
Interface status is not shown in alarms or events.
Workaround:
View interface with "show interfaces interface state oper-status".
1137121-3 : Tenants are stuck in Pending state with status 0/1 nodes available after upgrading to F5OS-A 1.2.0
Links to More Info: BT1137121
Component: F5OS-A
Symptoms:
The system is unable to start tenants, and the tenant reports a status of "Insufficient f5.com/qat".
Conditions:
Might occur after an F5OS-A software upgrade or after reinstalling K3s.
Impact:
Tenants will not start and are unusable.
Workaround:
To work around this issue, perform one of these actions:
1. Reboot the rSeries appliance.
or
2. Restart the qat-plugin process by logging into the appliance as root, and running "pkill qat-plugin".
Fix:
Fixed an issue with the qat-plugin process that prevented the system from starting tenants.
1136725-2 : An iptables CLI error
Links to More Info: BT1136725
Component: F5OS-A
Symptoms:
An iptables command error:
[root@appliance(appliance.chassis.local) ~]# iptables -L
Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Conditions:
When a parallel iptables query is happening, this error displays.
Impact:
The iptables can get disturbed.
User may not be able to view the iptables.
Workaround:
During iptables listing, it uses DNS and reverse DNS lookup if "-n" option is not used, which will make iptables hold the lock for longer durations.
Fix:
Added "-n" option in all places where iptables listing is happening.
1136597-3 : LDAP user with admin and operator role gets only operator permissions
Links to More Info: BT1136597
Component: F5OS-A
Symptoms:
An LDAP user configured with groups for both admin and operator roles only receives operator permissions.
Conditions:
LDAP user configured with gidNumber assignments for both admin and operator roles.
Impact:
A user with this config would be assigned only operator permissions.
Workaround:
Only configure the gidNumber for the desired role in LDAP for the user. Do not configure multiple roles for the same user.
Fix:
There was an error in the NACM rules for ConfD config. The role logic has been fixed.
1132569-1 : "cdb_exists failed" error logged in platform.log during boot up
Links to More Info: BT1132569
Component: F5OS-A
Symptoms:
This occurs unconditionally upon every reboot. It doesn't have any functional impact.
Conditions:
Upon every reboot.
Impact:
No impact.
Workaround:
N/A
Fix:
Boot or reboot the device and check platform.log. The issue should no longer occur.
1128877-2 : Mount command added to QKView collection
Links to More Info: BT1128877
Component: F5OS-A
Symptoms:
Mount command was not provided in QKView diagnostics file.
Conditions:
Always.
Impact:
Mount data is currently collected, but may be missing data provided by the mount command.
Workaround:
Run mount command on system and copy results from device.
Fix:
Mount command will be executed in QKView.
1118109-2 : CVE-2019-15605: HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
Component: F5OS-A
Symptoms:
A flaw was found in the Node.js code where a specially crafted HTTP(s) request sent to a Node.js server failed to properly process the HTTP(s) headers, resulting in a request smuggling attack. An attacker can use this flaw to alter a request sent as an authenticated user if the Node.js server is deployed behind a proxy server that reuses connections.
Conditions:
An attacker can use this flaw to alter a request sent as an authenticated user if the Node.js server is deployed behind a proxy server that reuses connections.
Impact:
An unauthorized user can gain access to the system.
Workaround:
N/A
Fix:
http-parser has been updated to http-parser-2.7.1-8.el7_7.2
1107361-5 : CVE-2020-15113 etcd: directories created via os.MkdirAll are not checked for permissions
Component: F5OS-A
Symptoms:
A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.
Conditions:
etcd versions before 3.3.23 and 3.4.10
Impact:
May allow unauthorized system access
Workaround:
Ensure directories used by etcd have appropriate permissions and ownership set.
Fix:
Removed the etcd RPM.
1099069-2 : Issues with pulling files from F5OS device using SCP
Links to More Info: BT1099069
Component: F5OS-A
Symptoms:
Unable to pull packet capture files off of the F5OS device using SCP from admin.
Conditions:
Download packet capture files using SCP from the admin account.
Impact:
Unable to download packet capture files through SCP from admin.
Workaround:
N/A
Fix:
Added support to download files from more directories.
1069365-3 : Error shown when configuring known-host for file transfer when FIPS mode is enabled`
Links to More Info: BT1069365
Component: F5OS-A
Symptoms:
"Host unreachable" error is sometimes displayed when FIPS mode is enabled, if a user tries to configure known-host. The ssh-keyscan fails, as ssh-keyscan is not using FIPS approved ciphers.
Conditions:
- FIPS mode is enabled
- User configures known-host for file transfer
Impact:
"Host unreachable" error is thrown.
Workaround:
N/A
Fix:
Updated ssh-keyscan to use FIPS approved ciphers when FIPS mode is enabled.
1047689-4 : Sw_rbcast core file found on system
Links to More Info: BT1047689
Component: F5OS-A
Symptoms:
Partition_sw_rbcast producing core.
Conditions:
Starting a tenant which requires the sw_rbcast container running in the following platforms:
- r5x00
- r10x00
- VELOS
Impact:
The sw_rbcast process crashes and produces a core file.
Workaround:
None
Fix:
A new version of sw_rbcast correctly handles tenant broadcast packets.
1008701-2 : Using curl to access 'scp:' URIs on the partition management IP does not work
Links to More Info: BT1008701
Component: F5OS-A
Symptoms:
Attempting to upload a tenant image via
"curl filename scp:IMAGES"
would fail, even though
"scp filename admin@mgmt-ip:IMAGES"
works.
Conditions:
Accessing ssh/scp via curl rather that the scp application.
Impact:
Cannot use curl to copy files.
Workaround:
Use scp directly rather than curl.
Fix:
The ssh/scp server has been fixed to correctly interpret the file/directory names supplied by the 'curl' command.
Known Issues in F5OS-A v1.5.x
F5OS-A Issues
| ID Number | Severity | Links to More Info | Description |
| 1359277-2 | 1-Blocking | BT1359277 | ConfD CLI timed out and subsequently sees Error: application communication failure |
| 1319573 | 1-Blocking | BIG-IP tenants created before F5OS-A 1.3.0 may be allocated a smaller disk than required | |
| 1314169-4 | 1-Blocking | BT1314169 | Tenant service-id mismatch between fdb mac-table and service-instance entries |
| 1292541 | 1-Blocking | Loading saved configuration on BIG-IP fails if host modifications are made after "tmsh save sys config" on R2800/R4800 platforms | |
| 1291353-1 | 1-Blocking | BT1291353 | LCD application does not update if appliance is power-cycled during firmware update |
| 1289929-1 | 1-Blocking | Tenants fail to come up due to abrupt power cycle | |
| 1288965-1 | 1-Blocking | Downgrade/upgrade issues are seen because ISO has special characters in the file name★ | |
| 1282493-1 | 1-Blocking | BT1282493 | Crypto devices are not released after tenants are deleted |
| 1273013-2 | 1-Blocking | Five percent (5%) deviation can be observed in TPS performance on R10920 and R5920 tenant | |
| 1253717-3 | 1-Blocking | BT1253717 | iavf driver crashes intermittently on r2000 or r4000 systems during system reboot |
| 1249873-2 | 1-Blocking | BT1249873 | sPVA hardware offload not working correctly on r10k |
| 1184441-2 | 1-Blocking | BT1184441 | VXLAN-GPE and GENEVE tunnel support |
| 1580489-2 | 2-Critical | BT1580489 | BE2 GCI interface training issue results in failure to process networking traffic |
| 1552377 | 2-Critical | Tenant pods/status stuck in Pending | |
| 1519005 | 2-Critical | BT1519005 | Libvirt core file is generated when the system is rebooted. |
| 1498521 | 2-Critical | Unable to remove the ISO images that share the same minor version with the running version | |
| 1472285 | 2-Critical | Server error occurs when trying to create LAG. | |
| 1469401-1 | 2-Critical | BT1469401 | ARP request for mgmt interface IP resolving to mgmt0-system inferface's mac |
| 1464729 | 2-Critical | Incorrect system-manager version is used in upgrade check while upgrading from 1.3.2 to 1.5.1 | |
| 1380705-2 | 2-Critical | BIG-IP tenant is stuck during boot up after doing tenant upgrade from 15.1.x to 17.1.x | |
| 1341701-1 | 2-Critical | BT1341701 | Unable to launch tenant, as VF interface is getting incorrect name while attaching to tenant. |
| 1330797-3 | 2-Critical | BT1330797 | Interfaces removed from LACP trunk due to traffic congestion |
| 1330793-3 | 2-Critical | BT1330793 | Interfaces removed from LACP trunk due to traffic congestion |
| 1325893-3 | 2-Critical | BT1325893 | A vqfdm system software core file is occasionally observed on system reboot |
| 1293245 | 2-Critical | BT1293245 | During upgrade/downgrade, VM failed to come up and remained in pending state |
| 1273221-2 | 2-Critical | BT1273221 | On rSeries FIPS system, operations which involve reboot, might result in FIPS device failure state |
| 1211853-3 | 2-Critical | BT1211853 | Hardware offload features may affect packets destined for unrelated tenants |
| 1188105-1 | 2-Critical | BT1188105 | K3SClusterUpgrade status shown as Done before cluster pods running up on appliance |
| 1186597-1 | 2-Critical | BT1186597 | K3S install status in f5OS ConfD is improved |
| 1169617-3 | 2-Critical | BT1169617 | BIG-IP tenant intermittently showing wrong status |
| 1154733-1 | 2-Critical | BT1154733 | LLDP error on management interface |
| 1144005-2 | 2-Critical | BT1144005 | TPS drop of ~14% from F5OS-A 1.1.0 and later on r10000 series platforms |
| 1126865-3 | 2-Critical | BT1126865 | F5OS HAL lock up if the LCD module is not responding. |
| 1753705 | 3-Major | BT1753705 | On rSeries System, QAT devices are not visible after restoring the config backup file |
| 1711981 | 3-Major | BT1711981 | On rSeries system, Power Cycle reboot might result in Tenant failure state |
| 1711965 | 3-Major | BT1711965 | FPGA link training issues while firmware update is running★ |
| 1682281-2 | 3-Major | BT1682281 | API Service Gateway Memory Leak Causes System Out of Memory |
| 1629445 | 3-Major | BT1629445 | On rSeries FIPS system, FIPS operation may cause messages on console |
| 1605509-1 | 3-Major | BT1605509 | GUI login fails with a crash in system_manager.external-authenticator |
| 1572489-2 | 3-Major | BT1572489 | User accounts with username which includes only numeric values or special characters like "." or ".." or starts with '-' are inactive |
| 1572137-4 | 3-Major | BT1572137 | Upload/Download API should work with '/api' and '/restconf' |
| 1558897 | 3-Major | BT1558897 | Log messages related to multus in /var/log/messages |
| 1552945-2 | 3-Major | BT1552945 | Tenant images renamed with bracket are not supported★ |
| 1505497-1 | 3-Major | During remote logging server configuration, selectors help menu does not display when using Tab key. | |
| 1505221-3 | 3-Major | BT1505221 | If accidentally import bad ISO images, it may not removed automatically |
| 1505185 | 3-Major | Resource-manager pod runs in the default namespace | |
| 1504089-1 | 3-Major | BT1504089 | System integrity check logs are logged with default name instead of system hostname in platform.log file |
| 1455913-1 | 3-Major | BT1455913 | Tcpdump on F5OS does not honor the -c flag |
| 1451181-1 | 3-Major | BT1451181 | The Rest API call to list core files returns 500 error when no core files found. |
| 1411137-1 | 3-Major | BT1411137 | Audit log entries are missing when creating or deleting objects via UI or API |
| 1391637-1 | 3-Major | BT1391637 | LCD panel, indicator, and F5 logo light turned off after system upgrade |
| 1365977-4 | 3-Major | BT1365977 | Container daemons running as PID 1 cannot be cored on-demand |
| 1352353-4 | 3-Major | BT1352353 | Remove integrity-check configurable option from CLI |
| 1346873-2 | 3-Major | BT1346873 | Timezone configuration logs "Timezone is invalid" warning |
| 1330273-2 | 3-Major | When MAC masquerade is enabled on r5k/r10k/r12k systems with a live upgrade, an FDB entry is seen on Active and Standby | |
| 1322685-1 | 3-Major | BT1322685 | Tcpdump sessions are terminated when interfaces are enabled or disabled. |
| 1315261 | 3-Major | QAT devices not populated in ConfD | |
| 1306197-2 | 3-Major | BT1306197 | The "show system image" command is taking more time than expected to display the output |
| 1293013-1 | 3-Major | BT1293013 | "show components component storage state disks disk state" is not auto populating |
| 1291305-1 | 3-Major | BT1291305 | LACP Mode is passive for a static trunk in tenants running r2000/r4000 platforms |
| 1288897-1 | 3-Major | BT1288897 | Allowed IP rule name, which contains all underscores, will be deleted while upgrading to F5OS-A 1.7.0 and later versions |
| 1285997-1 | 3-Major | BT1285997 | LLDP is allowed to configure on interfaces when virtual wire is enabled |
| 1280833 | 3-Major | BT1280833 | The error message is not correct when enabling client-cert (Client Certificate Authentication) before setting verify-client (Client Certificate Verification) to true |
| 1280441-1 | 3-Major | BT1280441 | When no parameter is given for 'system aaa tls create-self-signed-cert', encrypted key-type does not ask for passphrase |
| 1273129 | 3-Major | BT1273129 | TPM status may not reporting during PXE install |
| 1252197-2 | 3-Major | BT1252197 | F5OS LDAP / Active Directory authentication is case-sensitive (username case must match) |
| 1231609-2 | 3-Major | BT1231609 | exclude-cores "true" option still includes the core files in webUI/CLI |
| 1213185-3 | 3-Major | BT1213185 | ISO file not copied during clean install from USB DVD/CD-ROM device★ |
| 1211233 | 3-Major | BT1211233 | F5OS dashboard in webUI displays the system root file system usage, not the entire disk |
| 1209077-2 | 3-Major | BT1209077 | Unable to remove unused ISOs or services if used by openshift |
| 1196005-2 | 3-Major | BT1196005 | K3S pods version is shown incorrect★ |
| 1182605-2 | 3-Major | BT1182605 | Boot marker logs do not provide enough information |
| 1156005-1 | 3-Major | BT1156005 | system-host-config fails to handle order of DNS search path in /etc/resolv.conf |
| 1132605-2 | 3-Major | BT1132605 | Copied ISO file does not have the immutable bit set after F5OS USB install |
| 1127393-3 | 3-Major | Error message is not displayed when user configures more than 3 DNS servers in ConfD CLI or webUI | |
| 1126677-2 | 3-Major | BT1126677 | Inconsistencies with time zones displayed in controller and log files |
| 1430293-1 | 4-Minor | BT1430293 | Disk requirement validation is not implemented when tenant is in "Configured/Provision" state |
| 1345721-1 | 4-Minor | BT1345721 | The "show system state boot-time" command does not display any entry |
| 1210577-2 | 4-Minor | BT1210577 | Supportability: the confd_cmd utility is now included in the system controller container |
| 1184513-1 | 4-Minor | BT1184513 | F5OS audit log reports duration values in microseconds, using "ms" abbreviation |
Known Issue details for F5OS-A v1.5.x
1753705 : On rSeries System, QAT devices are not visible after restoring the config backup file
Links to More Info: BT1753705
Component: F5OS-A
Symptoms:
QAT devices are not visible in confd through output of "show cluster nodes node state crypto tenants tenant"
Conditions:
After backup-restore through confd
Impact:
No functional impact
Workaround:
Reboot to recover
1711981 : On rSeries system, Power Cycle reboot might result in Tenant failure state
Links to More Info: BT1711981
Component: F5OS-A
Symptoms:
After a power cycle restart of the F5OS-A rSeries system, existing tenant pods could go into a restart loop and never become active. Newly created tenants may also fail to start.
vfio reports Device or resource busy.
The tenant pod state can be checked with the below command on the host system.
[root@appliance-1:Active] vfio # kubectl get pods
NAME READY STATUS RESTARTS AGE
f5-resource-manager-bpnrr 1/1 Running 0 3h
virt-launcher-bigip-14-1-kz56l 1/1 Running 0 3h4m
virt-launcher-bigip-19-1-5m72j 1/1 Running 0 3h4m
virt-launcher-bigip-3-1-pn6c2 1/1 Running 0 3h4m
virt-launcher-bigip-4-1-8x4cc 1/1 Running 0 3h4m
virt-launcher-bigip-20-1-q99b7 1/1 Running 0 3h4m
virt-launcher-bigip-5-1-vr4cf 1/1 Running 0 3h4m
virt-launcher-bigip-18-1-zfrns 1/1 Running 0 162m
virt-launcher-bigip-1-1-qhjd5 1/1 Terminating 0 4m8s
virt-launcher-bigip-13-1-vjwwd 1/1 Terminating 0 3m19s
virt-launcher-bigip-12-1-7swfq 0/1 Completed 0 87s
virt-launcher-bigip-16-1-pqjx6 1/1 Running 0 43s
virt-launcher-bigip-15-1-56x2g 0/1 PodInitializing 0 5s
[root@appliance-1:Active] vfio #
Conditions:
The issue might occur in a power cycle restart, live software upgrade, or any operation that involves a reboot of the rSeries F5OS-A system.
The below logs will be observed.
[root@appliance-1:Active] # kubectl get pods
This command shows the pod name. You can use the following command to see the log in the problem pod. Hash in the pod name changes for every restart of the pod.
[root@appliance-1:Active] # kubectl logs <Problem Pod name displayed> | grep busy
qemu-kvm: -device vfio-pci,host=0000:53:01.6,id=hostdev0,bus=pci.10,addr=0x0: vfio 0000:53:01.6: failed to open /dev/vfio/95: Device or resource busy
Impact:
Some or all of the vfio devices could run into the problem, which results in some or all tenants deployed on the rSeries host do not work as expected. They do not change to a RUNNING state.
Workaround:
As the vfio devices are in a problem state, a graceful reboot of the appliance will resolve the issue.
1711965 : FPGA link training issues while firmware update is running★
Links to More Info: BT1711965
Component: F5OS-A
Symptoms:
When FPGA images are being updated and firmware updates are also running, link training issues can be seen.
# [ 239.204934] pciehp 0000:00:1c.0:pcie004: link training error: status 0x1801 =============>
[ 239.582567] pciehp 0000:00:1c.0:pcie004: Failed to check link status
Conditions:
This can occur during a clean install or upgrade. While the FPGA images are being updated, a message is printed to the console every fifteen seconds:
platform-mgr[14]: priority="Emerg" version=1.0 msgid=0x103000000000006 msg="Platform-mgr Firmware update in progress" elapsedseconds=30.
Impact:
Until the system is rebooted, the FPGA may not function correctly.
Workaround:
After all firmware updates are complete, reboot the appliance. If you are performing a new install or system upgrade, the reboot will happen automatically when the upgrade is complete.
1682281-2 : API Service Gateway Memory Leak Causes System Out of Memory
Links to More Info: BT1682281
Component: F5OS-A
Symptoms:
The api_svc_gateway process exhibits excessive memory consumption (observed consuming over 8.5GB), leading to system out-of-memory conditions. This triggers the Linux OOM killer which terminates processes and may cause api_svc_gateway core dumps. System becomes unstable due to memory exhaustion.
Conditions:
The specific conditions that trigger this memory leak have not been definitively identified due to the insufficient field data and the absence of reliable reproduction steps.
Based on available system telemetry, potential contributing factors may include:
1. System migrations (particularly iSeries to rSeries platform transitions)
2. Extended operational periods (observed in systems with 84+ days uptime)
3. Specific API service gateway operational patterns
Impact:
1. System instability due to memory exhaustion
2. API service gateway becomes unresponsive
3. Tenants fail to register with api_svc_gateway
4. Critical system processes may be terminated by OOM killer
5. System reboot may be required for recovery
Workaround:
Monitor api_svc_gateway memory consumption using system commands such as top. If an out-of-memory (OOM) condition renders the system unresponsive, perform a system reboot to restore normal operation.
1629445 : On rSeries FIPS system, FIPS operation may cause messages on console
Links to More Info: BT1629445
Component: F5OS-A
Symptoms:
Some or All of the FIPS operations that includes reset, init, force init may cause some warning messages on the console.
The messages looks like below:
[ 3774.513812] liquidsec_pf_vf_driver 0000:ca:00.0: Crypto requests are pending after app shutdown. Partition_index:0 resource cleanup could fail. Please validate partition before re-use.
Conditions:
FIPS operations like reset, init, force init performed after PXE install may cause warning messages on console.
Impact:
There is no functional impact. FIPS functionality remains intact.
Workaround:
None
1605509-1 : GUI login fails with a crash in system_manager.external-authenticator
Links to More Info: BT1605509
Component: F5OS-A
Symptoms:
The curl request or GUI login fails with core in system_manager.external-authenticator component. This is caused due to the corrupted primary key.
Conditions:
External curl request or GUI login.
Impact:
External curl request including GUI login fails.
Workaround:
1. You can regenerate the primary key using this command:
# system aaa primary-key set passphrase <value>
Try to login GUI and see if the crash appearing or not.
2. If the issue still persists, it requires clean install.
1580489-2 : BE2 GCI interface training issue results in failure to process networking traffic
Links to More Info: BT1580489
Component: F5OS-A
Symptoms:
Some particular rSeries systems fail to process networking traffic due to the BE2 GCI interfaces not training properly, resulting in an FPGA datapath lockup.
One potential indication of this is the DMA agent detecting a DM Tx Action ring hang, which can be observed in velos.log / platform.log:
dma-agent[13]: priority="Alert" version=1.0 msgid=0x4201000000000130 msg="Health monitor detected DM Tx Action ring hung." ATSE=0 DM=0 OQS=3
Conditions:
RSeries r5000, r10000, or r12000-series appliance
This issue does not affect r2000 or r4000 series appliances.
Impact:
The system stops delivering traffic from front-panel ports to the host, although egress traffic may continue to work. If an LACP LAG is configured, ports will be unable to join the LAG.
Workaround:
None, and F5 continues tracking the BE2 issue via ID1596625.
1572489-2 : User accounts with username which includes only numeric values or special characters like "." or ".." or starts with '-' are inactive
Links to More Info: BT1572489
Component: F5OS-A
Symptoms:
User accounts created with username that include only numeric values are inactive or non-functional. Also, usernames starting with dash ‘-’, contain only “.”, “..”, or any invalid characters (other than letters, digits, underscores, dashes and $ (at the end)) creates non-functional user accounts.
Conditions:
User account with username containing only numerics or starts with dash '-' or username like "." or ".." are non-functional.
Impact:
Non-functional user accounts are created. User functionalities like set-password, change-password, or other would not be working as expected.
Workaround:
None
1572137-4 : Upload/Download API should work with '/api' and '/restconf'
Links to More Info: BT1572137
Component: F5OS-A
Symptoms:
Upload/Download is not working with '/api' endpoint.
Conditions:
Use '/api' endpoint to upload/download a file.
Impact:
Fails to Upload/Download a file.
Workaround:
None
1558897 : Log messages related to multus in /var/log/messages
Links to More Info: BT1558897
Component: F5OS-A
Symptoms:
Intermittently, during resizing of the tenant leads continuous display of log messages from multus every minute in /var/log/messages.
Conditions:
When tenant is resized, we are seeing log messages related to multus every minute in /var/log/messages.
Impact:
No impact on functionality.
Workaround:
Please reboot the system. This will fix the issue.
1552945-2 : Tenant images renamed with bracket are not supported★
Links to More Info: BT1552945
Component: F5OS-A
Symptoms:
Live upgrades with prior releases with tenants that use images with brackets in their name will fail when going to a version that restricts the tenant image name character set.
Conditions:
Tenants using image filename with brackets won't allow upgrades to releases that validate the image filename character set.
Impact:
The tenant will have to be recreated or upgrade to a version that does not have the validation.
Workaround:
Tenant has to be recreated with the original image that didn't contain brackets.
1552377 : Tenant pods/status stuck in Pending
Component: F5OS-A
Symptoms:
After a reboot or power cycle, the tenant status will be stuck in "Pending"
and logs error in getting result from DelNetwork: Link not found\"" pod="default/virt-launcher-idmdmzgslb-1-6jhj9"
Conditions:
When the device is rebooted or power cycled, the tenant status is stuck in Pending.
Impact:
Tenant will not be UP and status will be Pending.
Workaround:
Toggle the tenant state i.e. Move tenant to configured and back to deployed.
This will stop and start the tenant
1519005 : Libvirt core file is generated when the system is rebooted.
Links to More Info: BT1519005
Component: F5OS-A
Symptoms:
An incorrect Libvirt core file is generated when the system is rebooted intermittently. However, the tenant is healthy and functional after the reboot.
Conditions:
Intermittently, when the system reboots.
Impact:
A Libvirt core file is generated, however the tenant is healthy and functional.
Workaround:
None
1505497-1 : During remote logging server configuration, selectors help menu does not display when using Tab key.
Component: F5OS-A
Symptoms:
While configuring the remote logging server, using the Tab key does not display selector help menu.
Conditions:
While configuring the remote logging server, using the Tab key does not display selector help menu.
Impact:
No help menu is displayed
Workaround:
Use ? key to get help in selectors menu, while configuring remote server.
1505221-3 : If accidentally import bad ISO images, it may not removed automatically
Links to More Info: BT1505221
Component: F5OS-A
Symptoms:
When you accidentally import ISO images from a faulty URL, they cannot be removed or replaced with the correct URL.
Conditions:
User accidentally imports faulty ISO images to the system.
Impact:
Deleting and importing system ISO images might have an impact.
Workaround:
Login to the command line with root user access and remove the image via 'rm' under '/var/import/staging', and import the correct ISO.
1505185 : Resource-manager pod runs in the default namespace
Component: F5OS-A
Symptoms:
After downgrading from 1.7.0 or any higher version to any lower version below 1.7.0, a pod name 'resource-manager' runs in the default namespace.
Conditions:
When the system downgrades from 1.7.0 or higher version to 1.5.2 or any lower version.
Impact:
No functionality is impacted.
Workaround:
This pod can be ignored
1504089-1 : System integrity check logs are logged with default name instead of system hostname in platform.log file
Links to More Info: BT1504089
Component: F5OS-A
Symptoms:
Logs for the system integrity check are recorded with the default name rather than the system hostname in the platform.log file.
Conditions:
Enable fips-licensce on the device and set the system hostname to a different value than default.
But system integrity check logs are logged with default name in the platform.log file.
Impact:
No functional impact, but integrity check logs are logged with default name.
Workaround:
None
1498521 : Unable to remove the ISO images that share the same minor version with the running version
Component: F5OS-A
Symptoms:
Removal of ISO fails when a same minor version is shared. And the base version has been imported for the first time as part of the ISO that has been deleted.
Conditions:
The major and minor version of the current ISO must be same as the ISO version that has been removed/deleted. And the base version has been imported for the first time as part of the ISO that has been deleted.
Impact:
Unable to remove the unused ISO.
Workaround:
For controller/appliance, you must remove the ISO on a software version that includes different minor release. For example, you can remove 1.6.1-5555 while running ISO version 1.5.X or 1.7.X.
1472285 : Server error occurs when trying to create LAG.
Component: F5OS-A
Symptoms:
The following server error occurs and does not create LAG:
"Failure for data/openconfig-interfaces:interface API".
Conditions:
Using GUI and trying to access the LAG tab under Network Settings.
Impact:
The LAG page displays Server Error.
Workaround:
Try reopening the LAG tab several times.
1469401-1 : ARP request for mgmt interface IP resolving to mgmt0-system inferface's mac
Links to More Info: BT1469401
Component: F5OS-A
Symptoms:
1. Configure IP on mgmt0-system from ConfD.
2. Configure IP on mgmt using linux command.
3. ARP request to mgmt-ip resolves to MAC of mgmt0-system.
Conditions:
Configuring IP on mgmt interface using linux and nmcli/ip commands.
Impact:
No impact
Workaround:
None
1464729 : Incorrect system-manager version is used in upgrade check while upgrading from 1.3.2 to 1.5.1
Component: F5OS-A
Symptoms:
The incorrect system-manager version is used while upgrading F5OS-A from one patch release to another patch release. This causes issue in database compatibility checks and provide incorrect validation results.
Conditions:
When upgrading from one patch release (such as 1.3.2) to other patch release (such as 1.5.1).
Impact:
The database compatibility checks often , occasionally indicating success even in cases of incompatibility.
Workaround:
None
1455913-1 : Tcpdump on F5OS does not honor the -c flag
Links to More Info: BT1455913
Component: F5OS-A
Symptoms:
When using Tcpdump on F5OS with the -c flag, Tcpdump will not stop after receiving the given number of packets.
Conditions:
A Tcpdump session is started with the -c or --count flag.
Impact:
The Tcpdump session will not terminate after receiving the requested number of packets and will continue until manually terminated.
Workaround:
N/A
1451181-1 : The Rest API call to list core files returns 500 error when no core files found.
Links to More Info: BT1451181
Component: F5OS-A
Symptoms:
The ConfD List Core Files Rest API call request returns a 500 ERROR when no core files are found rather than returning an empty list.
Example:
https://10.10.10.1:8888/restconf/data/openconfig-system:system/f5-system-diagnostics-qkview:diagnostics/f5-system-diagnostics-qkview:core-files/f5-system-diagnostics-qkview:list
Conditions:
1. No core files exist on the system.
2. The Rest API for querying the list of core files is made.
Impact:
Limited, but may affect automation.
Workaround:
Automation can respond to 500 error.
1430293-1 : Disk requirement validation is not implemented when tenant is in "Configured/Provision" state
Links to More Info: BT1430293
Component: F5OS-A
Symptoms:
There is no validation for tenant storage size while tenant is in Configured or Provisioned state.
Conditions:
Tenant in Configured or Provisioned state
Impact:
Any disk size, or even less than required size as well.
Workaround:
None
1411137-1 : Audit log entries are missing when creating or deleting objects via UI or API
Links to More Info: BT1411137
Component: F5OS-A
Symptoms:
When creating or deleting multiple remote-server related objects via UI or API, multiple restart happens causing log message drop.
Conditions:
While creating or deleting multiple objects related to remote-server, rsyslog restart everytime to apply new configuration. Due to the restart, some log messages are dropped.
Impact:
Log messages are dropped due to multiple restarts of the rsyslog.
Workaround:
None
1391637-1 : LCD panel, indicator, and F5 logo light turned off after system upgrade
Links to More Info: BT1391637
Component: F5OS-A
Symptoms:
The system's LCD panel, as well as LCD indicator and the F5 logo light are off. In the user interface, an error reading 'Module communication error detected' can be seen.
Conditions:
Upgrading a r2600 appliance from F5OS-A 1.3.2 to F5OS-A 1.5.1 with LCD current version 1.01.063.00.1 and LCD target version 1.01.067.00.1.
Impact:
LCD panel, indicator, and F5 logo light on the system are off, and an error reading 'Module communication error detected' can be found in the user interface.
Workaround:
Reboot the system.
1380705-2 : BIG-IP tenant is stuck during boot up after doing tenant upgrade from 15.1.x to 17.1.x
Component: F5OS-A
Symptoms:
When F5OS reboots followed by a tenant upgrade from 15.1.x to 17.1.x, the tenants are getting stuck in boot up. This is applicable for both FIPS and normal license.
Symptoms:
[ 183.888473] [ OK ] Started dracut initqueue hook.
[ OK ] Reached target Remote File Systems (Pre).
[ OK ] Reached target Remote File Systems.
dracut-initqueue[251]: Warning: dracut-initqueue timeout - starting timeout scripts
[* ] A start job is running for dev-disk...54e.device (3min 36s / no limit)
The problem does not occur in all the deployed tenants. The main cause is that the BIG-IP tenant fails to boot when its LVM cache/metadata is not synced or is corrupted.
Conditions:
Host reboots followed by guest upgrade.
Tenants get rebooted and retain LVM info, the host gets rebooted, and tenants lose LVM info. There is a timing issue for LVM caching.
Impact:
Datapath and tenant configuration will be lost.
Workaround:
No workaround except recovery of the tenant. To recover the tenant we need manual intervention. We need to enter Maintenance mode, recover the LVMs, and reboot.
Booting into TMOS Maintenance:
Easiest way to do this is
in one window
while [ 1 ];do virtctl console cbip-tenant1-1 -n default;done
in another window
ps auxww|grep cbip-tenant1-1
kill that qemu pid
Then go back to the console window in the grub menu and select maintenance and execute vgcfgrestore
Please note this is not full proof.
1365977-4 : Container daemons running as PID 1 cannot be cored on-demand
Links to More Info: BT1365977
Component: F5OS-A
Symptoms:
- kill -QUIT (or any other core-producing signal) to a container process running as PID 1 does not cause a core file.
- Actual runtime errors do generate cores as expected.
Conditions:
Containers that run their services directly as PID 1.
Impact:
Not possible to force a core file for diagnostic purposes.
Workaround:
None
1359277-2 : ConfD CLI timed out and subsequently sees Error: application communication failure
Links to More Info: BT1359277
Component: F5OS-A
Symptoms:
CLI times out if the respective action is not completed within the specified time interval.
Conditions:
The action to perform takes more time than the specified timeout interval.
Impact:
Unable to perform ConfD action.
Workaround:
The respective container can be restarted or a system reboot can be performed.
1352353-4 : Remove integrity-check configurable option from CLI
Links to More Info: BT1352353
Component: F5OS-A
Symptoms:
In F5OS systems, root and admin users are allowed to toggle the integrity-check option from the CLI. When in FIPS mode, integrity-check should always execute on system startup and when demanded. Since the integrity-check option is configurable, users can disable it which puts the integrity of the system at risk.
Conditions:
The configurable integrity-check option is visible when the device is in FIPS mode.
Impact:
An admin or root user could access the CLI and disable integrity-check. This could replace files and packages which could impact the integrity of the system.
Workaround:
N/A
1346873-2 : Timezone configuration logs "Timezone is invalid" warning
Links to More Info: BT1346873
Component: F5OS-A
Symptoms:
The system log a warning 'Timezone is invalid' when the timezone is configured.
Ex:
2023-08-14T03:50:38.263725-04:00 appliance-1 platform-mgr[17]: priority="Warn" version=1.0 msgid=0x104000000000043 msg="Timezone is invalid" ZONE="America/Los_Angeles".
Conditions:
When the system timezone is changed.
Impact:
No known functional impact, timezone is updating on the system.
Workaround:
None
1345721-1 : The "show system state boot-time" command does not display any entry
Links to More Info: BT1345721
Component: F5OS-A
Symptoms:
The "show system state boot-time" command does not work properly.
r10900-2# show system state boot-time
% No entries found.
Conditions:
N/A
Impact:
r10900-2# show system state boot-time
% No entries found.
Workaround:
This command is disabled in F5OS-C 1.6.0; it must be disabled in F5OS-A as well.
1341701-1 : Unable to launch tenant, as VF interface is getting incorrect name while attaching to tenant.
Links to More Info: BT1341701
Component: F5OS-A
Symptoms:
On r2x00/r4x00 related systems, tenant launch fails with an error in ConfD tenant status leaf:
"[default/virt-launcher-bip1-1-9sblf:sriov-net3-bip1]: error adding container to network "sriov-net3-bip1": failed to set up pod interface "net7" from the device "x557_4": failed to set netlink MAC address to 00:94:a1:db:bd:0c: resource temporarily unavailable"
Linux network manager udev rules and sriov cni try to
access the VF and change the interface name of VF. During this process, VFs fail and unable to retrieve. Thus, resource temporarily unavailable error occurs.
Conditions:
On r4x00 or r2x00 based systems:
1. In kubectl get pods -A output, the tenant pod goes into Init:0/1 state.
default virt-launcher-bip1-1-t6rkh 0/1 Init:0/1 0 36s
2. And in kubectl events, "resource temporarily unavailable" occurs on one of the VFs.
3. In /sys/class/net folder unable to see the below VF interfaces. Instead, some interfaces point to ensp* names which are wrong.
Actual result should be as follows:
[root@appliance-1 ~]# ls /sys/class/net
apigw-dummy-1 lcd sfp_7 sfp_p6v0503 veth0c09f23b veth6cec172f vethea3619d5 x557_p1v1100 x557_p3v1902
br_appliancenet lcd-intf sfp_8 sfp_p7v0900 veth2765115 veth80370796 vetheccdd5fb x557_p1v1101 x557_p3v1903
cni0 lo sfp_p5v0100 sfp_p7v0901 veth3f32fd86 veth82a8440b vethf4081a48 x557_p1v1103 x557_p4v1d00
default-intf mgmt sfp_p5v0101 sfp_p7v0903 veth4ab82fc6 veth8cda0b4d x557_1 x557_p2v1500 x557_p4v1d01
docker0 mgmt0-system sfp_p5v0102 sfp_p8v0d01 veth50d18b0 veth9e8b2e8c x557_2 x557_p2v1502 x557_p4v1d02
dummy0 sfp_5 sfp_p6v0500 sfp_p8v0d02 veth5fe12ffd vethac6590f8 x557_3 x557_p2v1503
flannel.1 sfp_6 sfp_p6v0502 sfp_p8v0d03 veth64783052 vethb688f03e x557_4 x557_p3v1901
Impact:
Tenant launch is unsuccessful and unable to connect to the tenant console or tenants' management connection.
Workaround:
1. Move tenants to configured state
2. Remove ice, iavf drivers using the following commands,
a. "rmmod /lib/modules/3.10.0-1160.71.1.F5.el7_8.x86_64/updates/drivers/net/ethernet/intel/ice/ice.ko"
b. "rmmod /lib/modules/3.10.0-1160.71.1.F5.el7_8.x86_64/updates/drivers/net/ethernet/intel/iavf/iavf.ko"
4. Load ice and iavf drivers using the following commands
a. "insmod /lib/modules/3.10.0-1160.71.1.F5.1.el7_8.x86_64/updates/drivers/net/ethernet/intel/ice/ice.ko"
b. "insmod /lib/modules/3.10.0-1160.71.1.F5.1.el7_8.x86_64/updates/drivers/net/ethernet/intel/iavf/iavf.ko"
5. Run config_ice_vfs.sh script present in /usr/omd/scripts/ folder using - "sh /usr/omd/scripts/config_ice_vfs.sh"
6. Wait until script is completed and VFs are created correctly.
6. Move tenants to running state and check the running state of tenant, after some time.
1330797-3 : Interfaces removed from LACP trunk due to traffic congestion
Links to More Info: BT1330797
Component: F5OS-A
Symptoms:
Interfaces repeatedly removed and added to a LACP LAG due to dropped LACP PDUs.
Conditions:
High traffic volume resulting in weighted-random-early-drop (WRED) being invoked.
Impact:
LACP PDUs dropped resulting in loss of LACP state.
Workaround:
Reboot affected blade.
1330793-3 : Interfaces removed from LACP trunk due to traffic congestion
Links to More Info: BT1330793
Component: F5OS-A
Symptoms:
Interfaces repeatedly removed and added to a LACP LAG due to dropped LACP PDUs.
Conditions:
High traffic volume resulting in weighted-random-early-drop (WRED) being invoked.
Impact:
LACP PDUs dropped resulting in loss of LACP state.
Workaround:
Reboot affected blade.
1330273-2 : When MAC masquerade is enabled on r5k/r10k/r12k systems with a live upgrade, an FDB entry is seen on Active and Standby
Component: F5OS-A
Symptoms:
When a MAC masquerade address is configured on BIG-IP in R5K/R10K/R12K based systems and a live upgrade of F5OS is done, an FDB entry can be seen in both Active F5OS appliance as well as Standby:
f5-appliance-active# show fdb
NDI
MAC ADDRESS VLAN TAG TYPE VLAN TAG TYPE VID ENTRY TYPE OWNER AGE ID SVC VTC SEP DMS DID CMDS MIRRORING INTERFACE
-----------------------------------------------------------------------------------------------------------------------------------------------------
00:94:a1:ab:cd:ef 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2b - 4095 9 - - - - 1 - -
02:94:a1:ab:cd:ee 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2b - 4095 9 - - - - 1 - -
f5-appliance-standby# show fdb
NDI
MAC ADDRESS VLAN TAG TYPE VLAN TAG TYPE VID ENTRY TYPE OWNER AGE ID SVC VTC SEP DMS DID CMDS MIRRORING INTERFACE
-----------------------------------------------------------------------------------------------------------------------------------------------------
00:94:a1:ab:ee:ef 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2a - 4095 9 - - - - 1 - -
02:94:a1:ab:cd:ee 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2a - 4095 9 - - - - 1 - -
Conditions:
On r5k/r10K/r12K systems where BIG-IP is configured in HA mode and MAC masquerading is addressed and configured, and F5OS is upgraded.
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
From Standby system remove fdb entry from confd.
f5-appliance-standby# show fdb
NDI
MAC ADDRESS VLAN TAG TYPE VLAN TAG TYPE VID ENTRY TYPE OWNER AGE ID SVC VTC SEP DMS DID CMDS MIRRORING INTERFACE
-----------------------------------------------------------------------------------------------------------------------------------------------------
00:94:a1:ab:cd:ef 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2b - 4095 9 - - - - 1 - -
02:94:a1:ab:cd:ee 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2b - 4095 9 - - - - 1 - -
f5-appliance-standby(config)# no fdb mac-table entries entry 02:94:a1:ab:cd:ee 3920 tag_type_vid
f5-appliance-standby(config)# comm
Commit complete.
f5-appliance-standby# show fdb
NDI
MAC ADDRESS VLAN TAG TYPE VLAN TAG TYPE VID ENTRY TYPE OWNER AGE ID SVC VTC SEP DMS DID CMDS MIRRORING INTERFACE
-----------------------------------------------------------------------------------------------------------------------------------------------------
00:94:a1:ab:ee:ef 3920 tag_type_vid 3920 tag_type_vid 3920 L2-LISTENER vm2a - 4095 9 - - - - 1 - -
1325893-3 : A vqfdm system software core file is occasionally observed on system reboot
Links to More Info: BT1325893
Component: F5OS-A
Symptoms:
The line-dma-agent or vqf-dm occasionally hits a cosmetic failure state as the entire system is rebooting, leading to a core file being produced prior to shutdown. There is no problem with the state of the system.
Conditions:
Due to left over data on a communication buffer from the tcpdump daemon to the line-dma-agent, on live-upgrade reboot the line-dma-agent can segfault during its shutdown after the tcpdump daemon already has gone down.
Impact:
A core file is observed on the system after the system finishes rebooting. This will happen during an upgrade from a version that is affected by this bug. The core file can be ignored.
Workaround:
None
1322685-1 : Tcpdump sessions are terminated when interfaces are enabled or disabled.
Links to More Info: BT1322685
Component: F5OS-A
Symptoms:
All tcpdump sessions terminates abruptly when an administrator enables or disables an interface on the system, even if the interface is not participating in the tcpdump session.
Conditions:
When an administrator enables or disables an interface on the system.
Impact:
All the current running tcpdump sessions are terminated and have to be restarted.
Workaround:
Do not make modifications to interfaces when the tcpdump sessions are active.
1319573 : BIG-IP tenants created before F5OS-A 1.3.0 may be allocated a smaller disk than required
Component: F5OS-A
Symptoms:
If the BIG-IP tenant is created before F5OS-A 1.3.0 with default storage size, the displayed size values in "show tenants tenant" are not correct. They will be displayed as "0".
Conditions:
Happens when the BIG-IP tenant is created before F5OS-A 1.3.0 with default storage size and upgrades to F5OS-A 1.5.1 (or a later version).
Impact:
No effect on BIG-IP tenant's functionality.
Workaround:
From F5OS-A 1.4.0, the user does not need to adjust the size unless the user needs a bigger size.
The right/minimum size will be auto-allocated when the state is changed.
1315261 : QAT devices not populated in ConfD
Component: F5OS-A
Symptoms:
When the tenants are deployed before a live upgrade, sometimes the tenant's QAT devices are not updated in the ConfD table after the upgrade. Hence the show command to list QAT devices does not display the devices. All other functionality is intact.
Conditions:
Tenant is deployed before a live upgrade.
Impact:
The below ConfD show command does not display the QAT devices allocated to the tenant.
show cluster nodes node node-1 state cryptos tenants tenant
1314169-4 : Tenant service-id mismatch between fdb mac-table and service-instance entries
Links to More Info: BT1314169
Component: F5OS-A
Symptoms:
The tenant service-instances IDs are not matching with the fdb mac-table service-ids. This happens when the system attempted to read a field that does not exist in the /services table.
Conditions:
Configuring tenants on F5OS-A.
Impact:
Fails to add all the additional services of a tenant to the service instance.
Workaround:
No workaround exists for older F5OS releases. Need to upgrade to F5OS-A 1.6.0 or later.
1306197-2 : The "show system image" command is taking more time than expected to display the output
Links to More Info: BT1306197
Component: F5OS-A
Symptoms:
The "show system image" command is taking more time than expected to display the output.
Conditions:
Execute the "show system image" command. Check for the CLI output.
Impact:
Degraded user experience when executing the "show system image" command.
1293245 : During upgrade/downgrade, VM failed to come up and remained in pending state
Links to More Info: BT1293245
Component: F5OS-A
Symptoms:
The VM went to a pending state in a series of multiple F5OS live upgrades/downgrades.
Conditions:
Intermittently on multiple F5OS live upgrades/downgrades.
Impact:
VM status shows pending.
Workaround:
Move the VM to the configured state and re-deploy it.
1293013-1 : "show components component storage state disks disk state" is not auto populating
Links to More Info: BT1293013
Component: F5OS-A
Symptoms:
"show components component storage state disks disk state" command does not show data.
But State data is shown using cmd - “show components component storage state”.
Conditions:
N/A
Impact:
No functional impact.
Workaround:
“show components component storage state” can be used for displaying state data.
1292541 : Loading saved configuration on BIG-IP fails if host modifications are made after "tmsh save sys config" on R2800/R4800 platforms
Component: F5OS-A
Symptoms:
Loading saved configuration on BIG-IP tenant running on R2800/R4800 fails when host has a different configurations compared to what is being loaded on the tenant.
Fails with an error message similar to below:
01070257:3: Requested VLAN member (1.5) is currently a trunk member
Unexpected Error: Loading configuration process failed.
Conditions:
-- rSeries 4x00 or R2x00 platform
-- Configuration is backed up using tmsh
-- A change is made to one or more VLANs, interfaces, trunks, or type of VLANs on the host
-- The BIG-IP system loads the configuration
Impact:
Configuration load fails, which puts TMM into an inoperative state.
Workaround:
When tenant is in inoperative state because of this issue, the steps below help in recovering the system:
1. Revert the configuration on the platform related to VLANs attached to the tenant moved to INOPERATIVE state.
2. Check if reverted configuration is loaded in tenant.
3. Restart the mcpd service or reboot the tenant to bring back tenant to active state.
4. Once the tenant is back to active state, save the config using "save sys config".
5. Now subsequent reboots will not let tenant to go into INOPERATIVE state.
1291353-1 : LCD application does not update if appliance is power-cycled during firmware update
Links to More Info: BT1291353
Component: F5OS-A
Symptoms:
After an OS update, an automatic firmware update runs and attempts to update all necessary firmware images. If the appliance is power-cycled or rebooted while the LCD application is being updated, the LCD update can fail and the system will report the old firmware version.
Conditions:
The OS is updated and an LCD firmware update is required. During that update, the appliance is rebooted or power-cycled, causing the LCD application update not to complete.
Impact:
The LCD application has not been updated and needs to be updated to get the latest features and bug fixes.
Workaround:
After verifying that the automatic firmware update process is complete, wait at least 5 minutes, look at the file /var/F5/system/AFU_COMPLETE, look for "AFU_STATUS: FWU_DONE", restart the system allowing automatic firmware to restart, and reprogram the LCD.
1291305-1 : LACP Mode is passive for a static trunk in tenants running r2000/r4000 platforms
Links to More Info: BT1291305
Component: F5OS-A
Symptoms:
LACP Mode set to active or passive mode causes a LAG to participate in negotiation whereas a static LAG configuration does not participate in negotiation. Hence lacp-mode does not make sense for static LAG interfaces.
Conditions:
When a static LAG is created on a platform, and a tenant is launched with a VLAN to which the static LAG interface is associated.
Impact:
An LACPd daemon is running on R2000/R4000 platforms which is responsible for running LACP protocol; the tenant is not dependent on LACP mode configurations and hence there will not be any impact. This is more of a display issue where one might confuse displaying LACP mode as passive for a static LAG interface.
Workaround:
There is no workaround for this behavior.
1289929-1 : Tenants fail to come up due to abrupt power cycle
Component: F5OS-A
Symptoms:
The helper task terminates instantly due to glibc rpm corruption. The abrupt reboot has caused corruption in the container DB.
Conditions:
Abrupt power cycle during AFU Update.
Impact:
Tenant.
Workaround:
Uninstall and reinstall the K3S cluster.
1288965-1 : Downgrade/upgrade issues are seen because ISO has special characters in the file name★
Component: F5OS-A
Symptoms:
If an F5OS-A ISO with a filename containing 'special characters' ('+ , * , ? , ^ , $ , ( , ) , [ , ] , { , } , | , \') is imported, and the system is downgraded/upgraded to that version, it can result in the upgrade failing and the ISO being automatically removed.
Conditions:
1. Download and import an ISO with a 'special character' in its name, ex. 'F5OS-A-1.5.0-*.iso'.
2. Attempt an upgrade to the imported ISO version.
3. Upgrade will fail.
Impact:
An upgrade to a version of software marked as successfully imported can fail unexpectedly, requiring manual intervention to recover the system.
Workaround:
1. Before performing a platform software upgrade, compare versions referenced by the "show system image" ConfD CLI command with the names of files present in the "/var/import/staging” directory.
If the iso is not present in /var/import/staging but it is shown in "show system image" command output, then import again to "/var/import/staging”.
2. If there is any iso file with a name containing a special character present in "/var/import/staging” remove that version of platform software and re-import it by re-downloading the file with a name that does not include special characters. You may then attempt upgrade.
3.In-order to remove that iso file with a name containing a special characters use below command.
appliance-1(config)# system image remove iso <iso version>
4.In scenarios where above command fails or not possible to use above command
please follow below procedure to delete the image.
* login to the device using root.
* chattr -i "/var/import/staging/<iso with special characters>”
* rm -rf "/var/import/staging/<iso with special characters>”
Incase downgrade or upgrade failure is already happened, because this issue,
follow these steps to recover the system:
1.Download another copy of the ISO with a proper name to /var/import/staging.
2.Wait for five minutes for it to import. if confd is unavailable, you can check the logs in /var/log/sw-mgmt.debug for import status.
3.Once the import is complete, reboot the system. This should recover the system.
1288897-1 : Allowed IP rule name, which contains all underscores, will be deleted while upgrading to F5OS-A 1.7.0 and later versions
Links to More Info: BT1288897
Component: F5OS-A
Symptoms:
Customer are able to create an allowed-ip rule with a name containing all underscores, hyphens or dots, which is not readable.
Conditions:
Creating an allowed-ip rule with a name which contain only allowed special characters.
Impact:
Created allowed-ip rule, with a name containing only underscores, hyphens or dots, will be deleted during upgrade.
Workaround:
Customer must rename the allowed-ip rule name that contain all special characters with a name containing at least one alpha-numeric character before upgrading to F5OS-A 1.7.0 or later Versions.
1285997-1 : LLDP is allowed to configure on interfaces when virtual wire is enabled
Links to More Info: BT1285997
Component: F5OS-A
Symptoms:
LLDP is allowed to configure on interfaces although virtual wire is enabled.
Conditions:
1) Enable virtual wire on interface.
2) Attach interfaces to a lag.
3) Enabled LLDP on the interfaces.
Impact:
When virtual wire is enabled, BIG-IP will function in transparent mode and is not expected to see interfaces on either side.
With this issue, F5 interfaces will be visible when LLDP is enabled.
Workaround:
Do not configure LLDP on the interfaces when virtual wire is enabled.
1282493-1 : Crypto devices are not released after tenants are deleted
Links to More Info: BT1282493
Component: F5OS-A
Symptoms:
Deleting the tenants does not release the crypto devices that were allocated to those tenants while creating them.
Conditions:
When a software upgrade was initiated incorrectly such as:
1. Upgrading only OS version
2. Upgrading only Service version
Impact:
Crypto devices behavior will be unexpected.
Workaround:
Always upgrade the software with ISO that contains the correct OS and services combination.
1280833 : The error message is not correct when enabling client-cert (Client Certificate Authentication) before setting verify-client (Client Certificate Verification) to true
Links to More Info: BT1280833
Component: F5OS-A
Symptoms:
An error on the ConfD CLI occurs when the user tries to enable Client Certificate Authentication before setting Client Certificate Verification to true. The error message given by this condition is not correct.
Conditions:
- User trying to enable Client Certificate Authentication when Client Certificate Verification is set to false.
Impact:
Due to the incorrect error message, the user is not able to enable Client Certificate Authentication.
Workaround:
N/A
1280441-1 : When no parameter is given for 'system aaa tls create-self-signed-cert', encrypted key-type does not ask for passphrase
Links to More Info: BT1280441
Component: F5OS-A
Symptoms:
When requesting a self-signed-cert, if the key-type is encrypted, then a passphrase is required. However, if no parameters are supplied, the key-type is then requested as a mandatory parameter, but won't ask for passphrase if encrypted type is selected.
Conditions:
No parameters passed to the config: system aaa tls create-self-signed-cert.
Impact:
An error indicates that the passphrase wasn't supplied, but it never was asked for in these conditions.
Workaround:
Specify key-type as a parameter and then if encrypted, the passphrase will be requested.
1273221-2 : On rSeries FIPS system, operations which involve reboot, might result in FIPS device failure state
Links to More Info: BT1273221
Component: F5OS-A
Symptoms:
After reboot of the F5OS-A rSeries system in any operations (for example, live upgrade, reboot), FIPS HSM card might not become operational, and tenants that were running earlier might not come into a running state. This is due to the handshake failure between the liquid security driver and the HSM card. The driver gets stuck in SAFE_STATE instead of coming into SECURE_OPERATIONAL_STATE.
The driver state can be checked with the below command on the host system.
[root@appliance-1 ~]# cat /proc/cavium_n3fips/driver_state
HSM 0:SECURE_OPERATIONAL_STATE
[root@appliance-1 ~]#
Conditions:
The issue might occur in a live software upgrade or any situation that involves a reboot of the rSeries FIPS system with F5OS-A.
The below logs will be observed in dmesg repeatedly for every retry of the hand shake between driver and HSM card.
[ 964.113688] liquidsec_pf_vf_driver 0000:ca:00.0: We might have a link issue... resetting
[ 964.113688] liquidsec_pf_vf_driver 0000:ca:00.0: RESETTING FIRMWARE... CAUTION
Impact:
FIPS HSM is not operational in the system, which results in FIPS tenants deployed on the F5OS rSeries host do not work as expected. They do not change to a RUNNING state.
Workaround:
As the driver is stuck in "HSM 0:SAFE_STATE", a power reboot will resolve the issue.
Below are the steps to follow:
1. Power off
2. Wait for 5 minutes
3. Power on
1273129 : TPM status may not reporting during PXE install
Links to More Info: BT1273129
Component: F5OS-A
Symptoms:
The tpm-integrity-status parameter may incorrectly be displayed as "Unavailable" when running the ‘show components component platform command’.
Conditions:
When performing a PXE install downgrade, SIRR DB does not persist across OS updates. This leads to mismatch SIRR and BIOS version; SIRR DB may not have the info about the newer BIOS version, causing inconsistencies in TPM validation.
Impact:
This may impacting TPM integrity validation.
Workaround:
Contact F5 support for further assistance and more details.
1273013-2 : Five percent (5%) deviation can be observed in TPS performance on R10920 and R5920 tenant
Component: F5OS-A
Symptoms:
On R10920 and R5920 tenants, the TPS performance degradation may be observed up to 5%.
Conditions:
When the R10920 and R5920 tenant is deployed.
Impact:
TPS performance may be degraded by 5%.
Workaround:
N/A
1253717-3 : iavf driver crashes intermittently on r2000 or r4000 systems during system reboot
Links to More Info: BT1253717
Component: F5OS-A
Symptoms:
When the r2000/r4000 system goes down during reboot, a crash of iavf driver is seen on the system console intermittently. This crash occurs due to multiple calls to the same function that releases the network devices inside iavf driver code.
Conditions:
Occurs intermittently on r2000/r4000 systems that use iavf drivers to manage datapath network devices/ports when the system is rebooting.
Impact:
No functional impact.
Workaround:
N/A
1252197-2 : F5OS LDAP / Active Directory authentication is case-sensitive (username case must match)
Links to More Info: BT1252197
Component: F5OS-A
Symptoms:
Using LDAP / Active Directory to remotely authenticate to the F5OS system treats usernames in a case-sensitive fashion. If a user attempts to authenticate to the F5OS system and specifies the username in a case that differs from how it is defined in the directory, authentication will fail.
For instance, if the Active Directory username is defined in the directory in all caps ("sAMAccountName: USERNAME"), F5OS will not authenticate the user if they attempt to log in with the username as "username".
Failed SSH connection attempts will generate system logs similar to the following:
hostname sshd[11440]: pam_faillock(sshd:auth): User unknown: username
hostname sshd[11440]: pam_unix(sshd:auth): check pass; user unknown
hostname sshd[11440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.0.2.1
hostname sshd[11440]: pam_ldap(sshd:auth): username changed from username to USERNAME
hostname sshd[11438]: pam_loginuid(sshd:session): error: login user-name 'username' does not exist
hostname sshd[11438]: pam_namespace(sshd:session): user unknown 'username'
hostname sshd[11438]: pam_keyinit(sshd:session): Unable to look up user "username"
hostname sshd[11438]: pam_unix(sshd:session): session opened for user username by (uid=0)
hostname sshd[11438]: error: PAM: pam_open_session(): Cannot make/remove an entry for the specified session
hostname sshd[11438]: fatal: login_init_entry: Cannot find user "username"
hostname sshd[11438]: fatal: login_init_entry: Cannot find user "username"
hostname sshd[11451]: fatal: mm_request_send: write: Broken pipe
Conditions:
- Using LDAP or Active Directory authentication for F5OS system authentication
- Attempting to log in with username specifying the username with case that differs from how the username is defined in the remote directory.
Impact:
Authentication fails on both the CLI and GUI
Workaround:
When logging into an F5OS system, specify the username as it exists in the directory.
1249873-2 : sPVA hardware offload not working correctly on r10k
Links to More Info: BT1249873
Component: F5OS-A
Symptoms:
The DOS attack traffic is distributed unevenly on different TMMs, and some DOS attack traffic is not handed off to hardware due to a misconfigured DOS group.
Conditions:
Any DOS vector traffic going through the r10k device
Impact:
Reduced performance for DOS attack and hardware offload is not active.
Workaround:
No workaround exists for older F5OS releases. Need to upgrade to any latest F5OS version from F5OS-A 1.6.0 or later.
1231609-2 : exclude-cores "true" option still includes the core files in webUI/CLI
Links to More Info: BT1231609
Component: F5OS-A
Symptoms:
Collecting a QKView with "exclude-cores true" results in a QKView that still has core files in it.
Conditions:
If QKView is collected with "exclude core true" option.
Impact:
Core files are not excluded part of QKView file.
Workaround:
There is no workaround as cores files always included with any option.
1213185-3 : ISO file not copied during clean install from USB DVD/CD-ROM device★
Links to More Info: BT1213185
Component: F5OS-A
Symptoms:
ISO file is not copied over to /var/import/staging during a clean install with DVD devices.
Conditions:
Clean install with DVD devices.
Impact:
ISO file not copied to /var/import/staging and importing any other image will cause problems with further upgrades or downgrades.
Workaround:
Explicitly copy the ISO file which ever used for clean installation to the device to the location /var/import/staging.
1211853-3 : Hardware offload features may affect packets destined for unrelated tenants
Links to More Info: BT1211853
Component: F5OS-A
Symptoms:
When a tenant requests that hardware assist be enabled for an L4 connection, syn cookie protection, DDoS protection, or allowlist/denylist, it is possible that packets destined for other tenants on the same VLAN will be affected by the hardware assist entry.
Conditions:
Hardware assist must have been activated for a specific flow or DDoS profile, and packets must be present for unrelated tenants that are on the same VLAN and contain the same IP destination and/or IP source address as the hardware assist activation.
Impact:
Packets destined for unrelated tenants may receive unexpected handling as a result of hardware assist matching those packets. For example, packets for an unrelated tenant on the same VLAN might be unexpectedly dropped if they have the same IP destination address as the activated DDoS hardware assist.
Workaround:
Ensure that tenants all use unique VLANs or that tenants that share a VLAN use unique IP source/destination addresses for their traffic.
1211233 : F5OS dashboard in webUI displays the system root file system usage, not the entire disk
Links to More Info: BT1211233
Component: F5OS-A
Symptoms:
The Dashboard page displays disk usage information that can be misleading.
For example, on an r5900 the following information may be shown:
Storage Capacity: 109.4GB
System Storage Free: 89.1GB
System Storage Used: 15%
However, the storage capacity is a value taken from the root (/) filesystem. It does not represent the entire 800GB disk, and does not show information about the file systems where tenant images reside.
Conditions:
View Dashboard page in webUI.
Impact:
This is a cosmetic issue.
Workaround:
Linux commands such as "df -hl -t ext4" will provide detailed information about disk usage.
Another breakdown of the disk partition use can also be seen using "lsblk /dev/nvme0n1". Note that nvme0n1 is the physical disk of interest.
Example from rSeries appliance:
# lsblk /dev/nvme0n1
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 683.5G 0 disk
|-nvme0n1p1 259:1 0 1G 0 part /boot/efi
|-nvme0n1p2 259:2 0 1G 0 part /boot
|-nvme0n1p3 259:3 0 455.3G 0 part
| `-partition_tenant-root 253:2 0 455.3G 0 lvm /var/F5/system/cbip-disks
|-nvme0n1p4 259:4 0 113.9G 0 part
| `-vdo_vol 253:3 0 227.7G 0 vdo
| `-partition_image-export_chassis 253:4 0 227.7G 0 lvm /var/export/chassis
1210577-2 : Supportability: the confd_cmd utility is now included in the system controller container
Links to More Info: BT1210577
Component: F5OS-A
Symptoms:
Occasionally F5 Support might ask for confd_cmd commands to be run. This fix makes the confd_cmd utility easier to access.
Conditions:
Running F5OS. A request from F5 Support to run confd_cmd.
Impact:
It is difficult to run confd_cmd commands for troubleshooting purposes.
1209077-2 : Unable to remove unused ISOs or services if used by openshift
Links to More Info: BT1209077
Component: F5OS-A
Symptoms:
Even if an imported version of a controller service says it is not in use in ConfD, it is possible under certain conditions for Openshift to still depend on that version of services. In such cases, it will not be possible to remove that version of services until Openshift is re-installed.
Conditions:
Openshift was rebuilt on a version of the controller OS earlier than 1.5.0, and user attempts to remove services that openshift relies on after rebuild.
Impact:
Unable to remove some ISOs and services that indicate they are unused.
Workaround:
Rebuild openshift cluster.
1196005-2 : K3S pods version is shown incorrect★
Links to More Info: BT1196005
Component: F5OS-A
Symptoms:
In rSeries r4000 and r2000 devices running F5OS-A v1.1.1, all K3S services have an incorrect tag (string 'message') instead of the actual number, due to an unknown issue with the docker registry at that time.
Conditions:
Live upgrade.
Impact:
Tenant deployment fails.
Workaround:
Live upgrade to the release after 1.2.0.
1188105-1 : K3SClusterUpgrade status shown as Done before cluster pods running up on appliance
Links to More Info: BT1188105
Component: F5OS-A
Symptoms:
When an appliance upgrades the k3s (Lite Weight Kubernetes) to newer version, the K3S Cluster Upgrade status goes to Done state before bringing cluster pods up and running.
Conditions:
When Upgrade of K3S cluster gets triggered, the cluster upgrade status gets updated in ConfD before bringing cluster pods up.
Impact:
No functional impact. But the information published can be misleading.
Workaround:
With K3sClusterupdate status also checks for the cluster pods status to see if the cluster came up properly.
1186597-1 : K3S install status in f5OS ConfD is improved
Links to More Info: BT1186597
Component: F5OS-A
Symptoms:
K3S install status is not showing the actual cluster install status.
Conditions:
The issue is seen during Cluster deployment.
Impact:
Actual K3S install status is not reflected in "show cluster install-status" CLI.
Workaround:
"kubectl get pods -A" can be used to check the pod status.
1184513-1 : F5OS audit log reports duration values in microseconds, using "ms" abbreviation
Links to More Info: BT1184513
Component: F5OS-A
Symptoms:
The F5OS audit log reports the duration of some calls that occur through RESTCONF. These duration values use an "ms" unit, which in this case stands for microseconds, not milliseconds.
For example:
<INFO> 23-Aug-2022::18:28:00.602 appliance-1 confd[106]: audit user: netsupport/7502531 RESTCONF: response with http: HTTP/1.1 /restconf/data//openconfig-system:system/f5-system-image:image/remove 400 duration 122160290 ms
This operation took ~122 seconds, not ~1.4 days.
Conditions:
Using the F5OS audit log.
Impact:
Difficult to interpret audit log.
Workaround:
Interpret the duration values as being in microseconds, not milliseconds.
1184441-2 : VXLAN-GPE and GENEVE tunnel support
Links to More Info: BT1184441
Component: F5OS-A
Symptoms:
VXLAN-GPE and GENEVE tunnel support can cause host-generated UDP frames with destination ports matching system configured destination ports for VXLAN-GPE or GENEVE to be treated as VXLAN-GPE or GENEVE traffic even if the underlying frame is not VXLAN-GPE or GENEVE. Frames fitting this characteristic may have a bad UDP checksum forced onto the frame if frame fails basic VXLAN-GPE or GENEVE protocol checks.
Conditions:
Administrator configures VXLAN-GPE and/or GENEVE tunnel support.
Impact:
Minimal.
Workaround:
Tunnels are disable by default. This issue is only observed if tunnels are enabled.
1182605-2 : Boot marker logs do not provide enough information
Links to More Info: BT1182605
Component: F5OS-A
Symptoms:
Boot marker logs should provide version and product information in the log.
Conditions:
After a reboot.
Impact:
It can be difficult to determine which version of VELOS a system was booting into.
1169617-3 : BIG-IP tenant intermittently showing wrong status
Links to More Info: BT1169617
Component: F5OS-A
Symptoms:
Due to the order and data with events received from Kubernetes, TPOB is failing to determine the latest status of the BIG-IP tenant status and temporarily displaying a wrong status.
The wrong status will be auto-corrected.
Conditions:
A tenant recovered from a error state randomly displays wrong status temporarily and then auto-corrects.
Impact:
Intermittent wrong status displayed with BIG-IP tenants.
Workaround:
N/A
1156005-1 : system-host-config fails to handle order of DNS search path in /etc/resolv.conf
Links to More Info: BT1156005
Component: F5OS-A
Symptoms:
Ordering of DNS search path is not preserved in /etc/resolv.conf.
>Add DNS search path in order A B.
Check /etc/resolve.conf => B A
>Now add DNS search path in order B A.
Check /etc/resolve.conf => B A
Conditions:
On rSeries platforms, user wants to configure DNS search path in alphabetical order.
Impact:
DNS search path is not added in the same order in /etc/resolv.conf.
Workaround:
N/A
1154733-1 : LLDP error on management interface
Links to More Info: BT1154733
Component: F5OS-A
Symptoms:
LLDP on mgmt interface is not supported. When enabled, show lldp command in ConfD CLI will not show any info related to mgmt interface.
Also, when enabled, below log will be displayed:
lldpd[8]: priority="Err" version=1.0 msgid=0x7302000000000021 msg="Failed to get did from interface name." ifname="mgmt"
Conditions:
When LLDP is enabled using ConfD CLI.
Impact:
The system logs an error message every 30 seconds:
lldpd[8]: priority="Err" version=1.0 msgid=0x7302000000000021 msg="Failed to get did from interface name." ifname="mgmt"
Workaround:
None
1144005-2 : TPS drop of ~14% from F5OS-A 1.1.0 and later on r10000 series platforms
Links to More Info: BT1144005
Component: F5OS-A
Symptoms:
A TPS drop of approximately 12-14% was observed when running 512KB L7 HTTP tests on r10000 series platforms.
Increased CPU usage, and larger tcp_lro receive packet sizes and some packet drops were observed when it is running with full capacity.
Conditions:
Upgrading F5OS-A software version from 1.0.0 to a later software version.
Impact:
If F5OS software is upgraded from F5OS-A 1.0.0 to any later version, including F5OS-A 1.1.0, there will a maximum drop of 14% in TPS from device actually supported in F5OS-A 1.0.0.
Workaround:
No mitigation currently available.
1132605-2 : Copied ISO file does not have the immutable bit set after F5OS USB install
Links to More Info: BT1132605
Component: F5OS-A
Symptoms:
When performing a USB install, F5OS creates the ISO file used for installation under /var/import/staging. Under certain conditions, this newly created ISO file is missing the immutable bit, allowing the file to be potentially modified or deleted while it is in use.
Conditions:
Perform a USB install of F5OS.
Impact:
New ISO file is missing the immutable bit (should show up as an 'i' in the chattr output).
[root@appliance-1 ~]# lsattr /var/import/staging/
-------------e-- /var/import/staging/F5OS-A-1.1.0-7645.R5R10.iso
This results in risk of the ISO file being deleted or modified while in use.
Workaround:
If the imported ISO file is still present in /var/import/staging, set the immutable bit on it, for example:
chattr +i /var/import/staging/R5R10.1.1.1-9159.iso
If the imported ISO file is missing, that is, because it was deleted or renamed:
1. Put a copy of the ISO file on the rSeries appliance named precisely the same as the original file was, for example:
Copy the ISO file to the rSeries appliance, but name it "R5R10.1.1.1-9159.iso" and put it in /var/import/staging/
2. Set the immutable bit on the file:
chattr +i /var/import/staging/R5R10.1.1.1-9159.iso
3. Reboot the device.
1127393-3 : Error message is not displayed when user configures more than 3 DNS servers in ConfD CLI or webUI
Component: F5OS-A
Symptoms:
When user tries to configure more than 3 DNS server entries in F5OS-A using command "system dns servers server" or from webUI, no error message is displayed. System allows only 3 DNS servers, but user will be allowed to configure more than 3.
Conditions:
Configure DNS server in F5OS-A using ConfD CLI or webUI.
Impact:
No impact. Even though user configures more than 3, system will take only 3 entries.
Workaround:
NA
1126865-3 : F5OS HAL lock up if the LCD module is not responding.
Links to More Info: BT1126865
Component: F5OS-A
Symptoms:
There are rare cases where the LCD module is present, enabled, and its network link is up; however, it does not respond to requests made by the HAL. Ultimately this causes a the HAL services to become unresponsive.
Conditions:
There are rare cases where the LCD does not respond to requests from the HAL services. When this happens, the HAL service can get locked up.
Impact:
When this rare event occurs, the HAL becomes unresponsive for other devices in the system, like the AOM for example.
Workaround:
If this occurs, a restart of the HAL services or a reset of the system is required to clear the condition.
1126677-2 : Inconsistencies with time zones displayed in controller and log files
Links to More Info: BT1126677
Component: F5OS-A
Symptoms:
System logs on F5OS systems are logged in a mix of the user's configured time zone (when available: controller/appliance) and UTC, depending on which log file you look at.
Conditions:
If user has a time zone configured that is different from UTC, the logs may show different times for log messages.
Impact:
Troubleshooting and tracing issues can be difficult, as the time zones used in different logs do not match.
Workaround:
N/A
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/