Manual Chapter : F5OS-A 1.8.4 Fixes and Known Issues Release Notes
F5OS-A Release Information

Version: 1.8.4
Build: 26491
Tag: LTS
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.

The blue background highlights fixes

Cumulative fixes from F5OS-A v1.8.3 that are included in this release
Cumulative fixes from F5OS-A v1.8.2 that are included in this release
Cumulative fixes from F5OS-A v1.8.0 that are included in this release
Known Issues in F5OS-A v1.8.x

Vulnerability Fixes

ID Number CVE Links to More Info Description
2131057-1 CVE-2016-2148 K000156994 CVE-2016-2148: Heap-based buffer overflow in the DHCP client, affecting BMC firmware
2218437-1 CVE-2025-37797 K000160078 CVE-2025-37797: kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling
2181757-1 CVE-2022-50367 K000158972 CVE-2022-50367 kernel: fs: UAF/GPF bug in nilfs_mdt_destroy
2131529-1 CVE-2025-8058 K000157129 CVE-2025-8058: glibc: Double free in glibc
2130793-2 CVE-2025-47268 K000158112 CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping
1824213-4 CVE-2025-0395 K000151474 CVE-2025-0395: glibc: buffer overflow in the GNU C Library's assert()
1695549-2 CVE-2024-23599 K000141500 CVE-2024-23599: Race condition in Seamless Firmware Updates
1692837 CVE-2024-21781 K000141509 CVE-2024-21781: Intel BIOS vulnerability
1498413-3 CVE-2023-28484 K000139641 CVE-2023-28484: A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.
1494209-4 CVE-2023-2953 K000138814 CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function
1401945-4 CVE-2023-3899 K000137798 CVE-2023-3899: subscription-manager : inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
1347625-10 CVE-2015-8540 K000141359 libpng: underflow read in png_check_keyword()
1346513-8 CVE-2017-7500
CVE-2017-7501
K03710547 CVE-2017-7500, CVE-2017-7501 rpm: Following symlinks to directories/files when installing packages allows privilege escalation
1327037-11 CVE-2020-14145 K48050136 openssh insecure client negotiation CVE-2020-14145
1306201-11 CVE-2022-23218 K49921213 glibc CVEs CVE-2009-5155, CVE-2022-23218, CVE-2022-23219, CVE-2017-8804, CVE-2020-1752, CVE-2021-35942, CVE-2021-3999
1306113-11 CVE-2019-8457 K000158050 Multiple CVEs in SQLite package
1303877-1 CVE-2022-33972 K000134942, BT1303877 INTEL-SA-00730: CVE-2022-33972
1301321-1 CVE-2022-38087 K000134744 CVE-2022-38087: Intel BIOS vulnerability
1289481-12 CVE-2021-3697,
CVE-2021-3695,
CVE-2022-28733,
CVE-2022-28734
K000132893 CVE-2021-3697, CVE-2021-3695, CVE-2022-28733, CVE-2022-28734: grub2
1200777-6 CVE-2022-2526 K000132680 systemd vulnerability CVE-2022-2526
1194885-9 CVE-2022-37434
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2018-12699
K67213091, BT1194885 CVE-2022-37434 zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
1187001-5 CVE-2019-3859
CVE-2019-3860
K000149288 CVE-2019-3859, CVE-2019-3860: libssh2
1186957-9 CVE-2022-35737 K000130512 CVE-2022-35737: sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API
1186921-9 ( CVE-2016-8688, CVE-2016-8687, CVE-2017-5601, CVE-2015-8915, CVE-2017-14501, CVE-2015-8933, CVE-2020-21674, CVE-2015-2304, CVE-2017-14166, CVE-2016-10209, CVE-2016-10350, CVE-2016-8689, CVE-2016-10349 ) K000148259 libarchive : CVE-2016-8688, CVE-2016-8687, CVE-2017-5601, CVE-2015-8915, CVE-2017-14501, CVE-2015-8933, CVE-2020-21674, CVE-2015-2304, CVE-2017-14166, CVE-2016-10209, CVE-2016-10350, CVE-2016-8689, CVE-2016-10349
1186589-9 CVE-2009-5155,CVE-2015-8982,CVE-2015-8983,CVE-2015-8984,CVE-2015-8985,CVE-2016-1234,CVE-2016-4429,CVE-2017-15671 K05125306 CVE-2016-1234 glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
1185301-9 CVE-2016-3189 K45816067 CVE-2016-3189 bzip2: heap use after free in bzip2recover
1184073-13 CVE-2021-3177, CVE-2020-26137,CVE-2020-26116 K000133759 Python and python-urllib3 security vulnerabilities (CVE-2021-3177, CVE-2020-26137, CVE-2020-26116)
1169625-7 CVE-2018-20685 K11315080 CVE-2018-20685: openssh: scp client improper directory name validation
1167457-6 CVE-2022-27404
CVE-2022-27405
CVE-2022-27406
K000141126 CVE-2022-27404, CVE-2022-27405, CVE-2022-27406: freetype
1113897-8 CVE-2022-26377 K26314875 CVE-2022-26377 httpd: mod_proxy_ajp: Possible request smuggling
1095225-4 CVE-2021-4083 K52379673 CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it
1677249-5 CVE-2024-6232 K000148252 CVE-2024-6232: python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
2198665-2 CVE-2021-3737 K000159893 CVE-2021-3737: python: urllib: HTTP client possible infinite loop on a 100 Continue response
2181681-1 CVE-2023-53373 K000159889 CVE-2023-53373 kernel: crypto: seqiv - Handle EBUSY correctly
2162969-4 CVE-2022-50356 K000160222 CVE-2022-50356 kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails
2107157 CVE-2025-9230 K000159887 OpenSSL security vulnerability (CVE-2025-9230)
1229989-8 CVE-2022-37436 K000132665 CVE-2022-37436 httpd: mod_proxy: HTTP response splitting
1123141-8 CVE-2022-28615 K40582331 Apache HTTP Server ap_strcmp_match() Out-of-Bounds Read (CVE-2022-28615)

Functional Change Fixes

None


F5OS-A Fixes

ID Number Severity Links to More Info Description
1166921-12 0-Unspecified libsolv: CVE-2021-33928, CVE-2021-33930, CVE-2021-33938 , CVE-2021-33929
2132141-1 1-Blocking BT2132141 Interface 8.0 on r2000 and r4000-series F5OS appliances does not join LACP LAG or transmit LLDP BPDUs after upgrade to F5OS-A 1.8.3
1988997-3 1-Blocking Tenant experiences master key decrypt error after F5OS api-svc-gateway restart
2227221-3 2-Critical BT2227221 F5OS tpm-integrity-status is Unavailable on certain versions released since October 2025
2219813-3 2-Critical BT2219813 Empty File path in upload api leads to core
2211261-1 2-Critical Enable login-attribute to work with UPN based authentication in F5OS
2201365-1 2-Critical Intermittent webUI startup failure after F5OS v1.8.x upgrade caused by SSL certificate generation issue
2201053-1 2-Critical WebUI Connection may be refused After Upgrading to version F5OS-A 1.8.3
2183789-1 2-Critical BT2183789 FDB entries may expire when multiple entries hash to the same FPGA table index and traffic is intermittent
2182497 2-Critical CVE-2025-38352: kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
2152949-2 2-Critical BT2152949 Disabled ports or port mode mismatchs can cause bad register reads.
2151413-2 2-Critical BT2151413 TACACS External Authentication Failure after a software upgrade
2053301-2 2-Critical BT2053301 Upon reaching maximum memory capacity, BIG-IP tenant pods intermittently regenerated after a host reboot
1968289-3 2-Critical BT1968289 Confd.smp memory consumption spikes high with snmpEnableAuthenTraps enabled
1928829-3 2-Critical BT1928829 Egress traffic is being dropped by upstream switch following a reboot of rSeries.
1858617-2 2-Critical BT1858617 Users unable to login after reboot with LDAP group configured
1783685-1 2-Critical BT1783685 ATSE Datapath lockup on HBM calibration issue
1620921-2 2-Critical BT1620921 During live-upgrade, "show cluster cluster-status" shows "K3s IMAGE update has failed, will retry"
1497385-1 2-Critical BT1497385 F5OS SNMP IF-MIB::ifAlias missing from snmpwalk
1328921-1 2-Critical K000137633, BT1328921 Tenants on rSeries system will not deploy, stuck in "Starting" state, with status "Not ready: containers with unready status: [compute]"
2261661 3-Major CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip
2261657 3-Major CVE-2022-28131 - Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.
2228961-1 3-Major CVE-2026-25749 : Vim: Arbitrary code execution via 'helpfile' option processing
2218489-2 3-Major CVE-2025-38085 kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
2218469-1 3-Major CVE-2025-39817: kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
2218133-1 3-Major CVE-2026-0915: glibc: glibc: Information disclosure via zero-valued network query
2209005-1 3-Major BT2209005 TLS client authentication for LDAP servers not working
2207865-1 3-Major BT2207865 Snmpwalk misses LAG interface stats intermittently
2181821-1 3-Major CVE-2025-38614 kernel: eventpoll: semi-unbounded recursion
2181801-1 3-Major CVE-2025-38498 kernel: do_change_type(): refuse to operate on unmounted/not ours mounts
2171937-1 3-Major BT2171937 The Virtual Server is not receiving traffic due to an incorrect VLAN update from F5OS platform
2151269-1 3-Major BT2151269 Prompt-statusd process occasionally cores
2144597-1 3-Major CVE-2023-45803: urllib3: Request body not stripped after redirect from 303 status changes request method to GET
2131773-1 3-Major BT2131773 Error message IDs for image-agent do not match those documented in the error catalog
2131677-2 3-Major BT2131677 PSU inventory data shows "Not Available" on F5OS-A
2131429-1 3-Major BT2131429 init_etile: Cable check failed
2130773-4 3-Major CVE-2025-48964 iputils: iputils integer overflow
2088601-1 3-Major The anaconda-ssh service fails to start during installation phase, preventing remote SSH access
2044517-2 3-Major BT2044517 Changing LDAP configuration via the GUI results in an unexpected error
1959817-1 3-Major Qkview-collect crashes while collecting a QKView
1933645-1 3-Major BT1933645 GUI immediately logs user off with "User Session Terminated" error and "validator" process cores
1812541-1 3-Major K000150155, BT1812541 DDM system alarms triggered when interface is disabled
1779677-3 3-Major BT1779677 Multiple docker containers can get assigned the same bridge IP during rolling upgrade
1697197-1 3-Major Memory leak in tcpdumpd_manager, when doing tenant's VLAN configuration change
1671133-3 3-Major kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies
1623613-1 3-Major BT1623613 F5OS:Change of OIDs type from Counter64 to Gauge32 for system memory
1381385-1 3-Major BT1381385 Additional password policy settings
1346873-3 3-Major BT1346873 Timezone configuration logs "Timezone is invalid" warning
1341493-2 3-Major OpenShift cluster failure due to disk exhaustion from oversized log file's
1301941-10 3-Major CVE-2023-29491 ncurses: Local users can trigger security-relevant memory corruption via malformed data
1292297-11 3-Major CVE-2021-20095 CVE-2021-42771 python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
1285997-6 3-Major BT1285997 LLDP is allowed to configure on interfaces when virtual wire is enabled
1207097-10 3-Major CVE-2018-15664 - API endpoints behind the 'docker cp' command vulnerable to symlink-exchange attack with Directory Traversal
1187013-17 3-Major libtasn1 CVEs CVE-2018-1000654, CVE-2017-10790, CVE-2017-6891, CVE-2016-4008
1186633-9 3-Major CVE-2017-17840 iscsi-initiator-utils: Heap-based buffer overflow in
1186569-7 3-Major CVE-2018-16429 : Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
1186549-6 3-Major CVE-2021-0308 , CVE-2020-0256 : gdisk vulnerabilities
1167073-12 3-Major CVE-2021-3580 nettle: Remote crash in RSA decryption via manipulated ciphertext
1167069-11 3-Major CVE-2021-38185: cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file
1166869-12 3-Major CVE-2021-3520 lz4: memory corruption due to an integer overflow bug caused by memmove argument
1462929-3 4-Minor Platform-deployment script logs are now captured in both its dedicated log file and the systemd journal
1348197-9 4-Minor CVE-2016-2779 util-linux: runuser tty hijack via TIOCSTI ioctl
1348165-9 4-Minor CVE-2019-9893 in libseccomp is not applicable to this product release
1348157-9 4-Minor CVE-2018-6003 libtasn1: Stack exhaustion due to indefinite recursion during BER decoding
1346833-6 4-Minor CVE-2017-0553 libnl: Integer overflow in nlmsg_reserve()
1346821-9 4-Minor CVE-2020-13987: Open-iSCSI: OOB read in checksum calculation in uIP
1346797-9 4-Minor CVE-2019-15165 libpcap: Resource exhaustion during PHB header length validation
1346489-8 4-Minor CVE-2017-14502, CVE-2020-21674: libarchive: Off-by-one error in the read_header function and DOS with heap-based buffer overflow in lib archive-3.4.1dev
1346465-8 4-Minor CVE-2019-20387 libsolv: out-of-bounds read in repodata_schema2id in repodata.c
1306561-9 4-Minor CVE-2021-27218: glib2: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform
1186625-9 4-Minor CVE-2019-11360 iptables: buffer overflow in iptables-restore
1186621-9 4-Minor CVE-2019-20795 iproute: use-after-free in get_netnsid_from_name in ip/ipnetns.c
1186617-10 4-Minor CVE-2014-3564 gpgme: heap-based buffer overflow in gpgsm status handler
1186565-6 4-Minor CVE-2020-13645 glib-networking: GTlsClientConnection silently ignores unset server identity
1186517-9 4-Minor CVE-2015-8872 , CVE-2016-4804: dosfstools
1185573-8 4-Minor CVE-2019-9704
1185305-9 4-Minor CVE-2020-14367 chrony: Insecure writing to PID file
1184905-9 4-Minor CVE-2021-3468 avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket

Vulnerability Fixes

ID Number CVE Links to More Info Description
2131057-1 CVE-2016-2148 K000156994 CVE-2016-2148: Heap-based buffer overflow in the DHCP client, affecting BMC firmware
2218437-1 CVE-2025-37797 K000160078 CVE-2025-37797: kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling
2181757-1 CVE-2022-50367 K000158972 CVE-2022-50367 kernel: fs: UAF/GPF bug in nilfs_mdt_destroy
2131529-1 CVE-2025-8058 K000157129 CVE-2025-8058: glibc: Double free in glibc
2130793-2 CVE-2025-47268 K000158112 CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping
1824213-4 CVE-2025-0395 K000151474 CVE-2025-0395: glibc: buffer overflow in the GNU C Library's assert()
1695549-2 CVE-2024-23599 K000141500 CVE-2024-23599: Race condition in Seamless Firmware Updates
1692837 CVE-2024-21781 K000141509 CVE-2024-21781: Intel BIOS vulnerability
1498413-3 CVE-2023-28484 K000139641 CVE-2023-28484: A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.
1494209-4 CVE-2023-2953 K000138814 CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function
1401945-4 CVE-2023-3899 K000137798 CVE-2023-3899: subscription-manager : inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
1347625-10 CVE-2015-8540 K000141359 libpng: underflow read in png_check_keyword()
1346513-8 CVE-2017-7500
CVE-2017-7501
K03710547 CVE-2017-7500, CVE-2017-7501 rpm: Following symlinks to directories/files when installing packages allows privilege escalation
1327037-11 CVE-2020-14145 K48050136 openssh insecure client negotiation CVE-2020-14145
1306201-11 CVE-2022-23218 K49921213 glibc CVEs CVE-2009-5155, CVE-2022-23218, CVE-2022-23219, CVE-2017-8804, CVE-2020-1752, CVE-2021-35942, CVE-2021-3999
1306113-11 CVE-2019-8457 K000158050 Multiple CVEs in SQLite package
1303877-1 CVE-2022-33972 K000134942, BT1303877 INTEL-SA-00730: CVE-2022-33972
1301321-1 CVE-2022-38087 K000134744 CVE-2022-38087: Intel BIOS vulnerability
1289481-12 CVE-2021-3697,
CVE-2021-3695,
CVE-2022-28733,
CVE-2022-28734
K000132893 CVE-2021-3697, CVE-2021-3695, CVE-2022-28733, CVE-2022-28734: grub2
1200777-6 CVE-2022-2526 K000132680 systemd vulnerability CVE-2022-2526
1194885-9 CVE-2022-37434
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2018-12699
K67213091, BT1194885 CVE-2022-37434 zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
1187001-5 CVE-2019-3859
CVE-2019-3860
K000149288 CVE-2019-3859, CVE-2019-3860: libssh2
1186957-9 CVE-2022-35737 K000130512 CVE-2022-35737: sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API
1186921-9 ( CVE-2016-8688, CVE-2016-8687, CVE-2017-5601, CVE-2015-8915, CVE-2017-14501, CVE-2015-8933, CVE-2020-21674, CVE-2015-2304, CVE-2017-14166, CVE-2016-10209, CVE-2016-10350, CVE-2016-8689, CVE-2016-10349 ) K000148259 libarchive : CVE-2016-8688, CVE-2016-8687, CVE-2017-5601, CVE-2015-8915, CVE-2017-14501, CVE-2015-8933, CVE-2020-21674, CVE-2015-2304, CVE-2017-14166, CVE-2016-10209, CVE-2016-10350, CVE-2016-8689, CVE-2016-10349
1186589-9 CVE-2009-5155,CVE-2015-8982,CVE-2015-8983,CVE-2015-8984,CVE-2015-8985,CVE-2016-1234,CVE-2016-4429,CVE-2017-15671 K05125306 CVE-2016-1234 glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
1185301-9 CVE-2016-3189 K45816067 CVE-2016-3189 bzip2: heap use after free in bzip2recover
1184073-13 CVE-2021-3177, CVE-2020-26137,CVE-2020-26116 K000133759 Python and python-urllib3 security vulnerabilities (CVE-2021-3177, CVE-2020-26137, CVE-2020-26116)
1169625-7 CVE-2018-20685 K11315080 CVE-2018-20685: openssh: scp client improper directory name validation
1167457-6 CVE-2022-27404
CVE-2022-27405
CVE-2022-27406
K000141126 CVE-2022-27404, CVE-2022-27405, CVE-2022-27406: freetype
1113897-8 CVE-2022-26377 K26314875 CVE-2022-26377 httpd: mod_proxy_ajp: Possible request smuggling
1095225-4 CVE-2021-4083 K52379673 CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it
1677249-5 CVE-2024-6232 K000148252 CVE-2024-6232: python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
2198665-2 CVE-2021-3737 K000159893 CVE-2021-3737: python: urllib: HTTP client possible infinite loop on a 100 Continue response
2181681-1 CVE-2023-53373 K000159889 CVE-2023-53373 kernel: crypto: seqiv - Handle EBUSY correctly
2162969-4 CVE-2022-50356 K000160222 CVE-2022-50356 kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails
2107157 CVE-2025-9230 K000159887 OpenSSL security vulnerability (CVE-2025-9230)
1229989-8 CVE-2022-37436 K000132665 CVE-2022-37436 httpd: mod_proxy: HTTP response splitting
1123141-8 CVE-2022-28615 K40582331 Apache HTTP Server ap_strcmp_match() Out-of-Bounds Read (CVE-2022-28615)

Functional Change Fixes

None


F5OS-A Fixes

ID Number Severity Links to More Info Description
1166921-12 0-Unspecified libsolv: CVE-2021-33928, CVE-2021-33930, CVE-2021-33938 , CVE-2021-33929
2132141-1 1-Blocking BT2132141 Interface 8.0 on r2000 and r4000-series F5OS appliances does not join LACP LAG or transmit LLDP BPDUs after upgrade to F5OS-A 1.8.3
1988997-3 1-Blocking Tenant experiences master key decrypt error after F5OS api-svc-gateway restart
2227221-3 2-Critical BT2227221 F5OS tpm-integrity-status is Unavailable on certain versions released since October 2025
2219813-3 2-Critical BT2219813 Empty File path in upload api leads to core
2211261-1 2-Critical Enable login-attribute to work with UPN based authentication in F5OS
2201365-1 2-Critical Intermittent webUI startup failure after F5OS v1.8.x upgrade caused by SSL certificate generation issue
2201053-1 2-Critical WebUI Connection may be refused After Upgrading to version F5OS-A 1.8.3
2183789-1 2-Critical BT2183789 FDB entries may expire when multiple entries hash to the same FPGA table index and traffic is intermittent
2182497 2-Critical CVE-2025-38352: kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
2152949-2 2-Critical BT2152949 Disabled ports or port mode mismatchs can cause bad register reads.
2151413-2 2-Critical BT2151413 TACACS External Authentication Failure after a software upgrade
2053301-2 2-Critical BT2053301 Upon reaching maximum memory capacity, BIG-IP tenant pods intermittently regenerated after a host reboot
1968289-3 2-Critical BT1968289 Confd.smp memory consumption spikes high with snmpEnableAuthenTraps enabled
1928829-3 2-Critical BT1928829 Egress traffic is being dropped by upstream switch following a reboot of rSeries.
1858617-2 2-Critical BT1858617 Users unable to login after reboot with LDAP group configured
1783685-1 2-Critical BT1783685 ATSE Datapath lockup on HBM calibration issue
1620921-2 2-Critical BT1620921 During live-upgrade, "show cluster cluster-status" shows "K3s IMAGE update has failed, will retry"
1497385-1 2-Critical BT1497385 F5OS SNMP IF-MIB::ifAlias missing from snmpwalk
1328921-1 2-Critical K000137633, BT1328921 Tenants on rSeries system will not deploy, stuck in "Starting" state, with status "Not ready: containers with unready status: [compute]"
2261661 3-Major CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip
2261657 3-Major CVE-2022-28131 - Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.
2228961-1 3-Major CVE-2026-25749 : Vim: Arbitrary code execution via 'helpfile' option processing
2218489-2 3-Major CVE-2025-38085 kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
2218469-1 3-Major CVE-2025-39817: kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
2218133-1 3-Major CVE-2026-0915: glibc: glibc: Information disclosure via zero-valued network query
2209005-1 3-Major BT2209005 TLS client authentication for LDAP servers not working
2207865-1 3-Major BT2207865 Snmpwalk misses LAG interface stats intermittently
2181821-1 3-Major CVE-2025-38614 kernel: eventpoll: semi-unbounded recursion
2181801-1 3-Major CVE-2025-38498 kernel: do_change_type(): refuse to operate on unmounted/not ours mounts
2171937-1 3-Major BT2171937 The Virtual Server is not receiving traffic due to an incorrect VLAN update from F5OS platform
2151269-1 3-Major BT2151269 Prompt-statusd process occasionally cores
2144597-1 3-Major CVE-2023-45803: urllib3: Request body not stripped after redirect from 303 status changes request method to GET
2131773-1 3-Major BT2131773 Error message IDs for image-agent do not match those documented in the error catalog
2131677-2 3-Major BT2131677 PSU inventory data shows "Not Available" on F5OS-A
2131429-1 3-Major BT2131429 init_etile: Cable check failed
2130773-4 3-Major CVE-2025-48964 iputils: iputils integer overflow
2088601-1 3-Major The anaconda-ssh service fails to start during installation phase, preventing remote SSH access
2044517-2 3-Major BT2044517 Changing LDAP configuration via the GUI results in an unexpected error
1959817-1 3-Major Qkview-collect crashes while collecting a QKView
1933645-1 3-Major BT1933645 GUI immediately logs user off with "User Session Terminated" error and "validator" process cores
1812541-1 3-Major K000150155, BT1812541 DDM system alarms triggered when interface is disabled
1779677-3 3-Major BT1779677 Multiple docker containers can get assigned the same bridge IP during rolling upgrade
1697197-1 3-Major Memory leak in tcpdumpd_manager, when doing tenant's VLAN configuration change
1671133-3 3-Major kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies
1623613-1 3-Major BT1623613 F5OS:Change of OIDs type from Counter64 to Gauge32 for system memory
1381385-1 3-Major BT1381385 Additional password policy settings
1346873-3 3-Major BT1346873 Timezone configuration logs "Timezone is invalid" warning
1341493-2 3-Major OpenShift cluster failure due to disk exhaustion from oversized log file's
1301941-10 3-Major CVE-2023-29491 ncurses: Local users can trigger security-relevant memory corruption via malformed data
1292297-11 3-Major CVE-2021-20095 CVE-2021-42771 python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
1285997-6 3-Major BT1285997 LLDP is allowed to configure on interfaces when virtual wire is enabled
1207097-10 3-Major CVE-2018-15664 - API endpoints behind the 'docker cp' command vulnerable to symlink-exchange attack with Directory Traversal
1187013-17 3-Major libtasn1 CVEs CVE-2018-1000654, CVE-2017-10790, CVE-2017-6891, CVE-2016-4008
1186633-9 3-Major CVE-2017-17840 iscsi-initiator-utils: Heap-based buffer overflow in
1186569-7 3-Major CVE-2018-16429 : Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
1186549-6 3-Major CVE-2021-0308 , CVE-2020-0256 : gdisk vulnerabilities
1167073-12 3-Major CVE-2021-3580 nettle: Remote crash in RSA decryption via manipulated ciphertext
1167069-11 3-Major CVE-2021-38185: cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file
1166869-12 3-Major CVE-2021-3520 lz4: memory corruption due to an integer overflow bug caused by memmove argument
1462929-3 4-Minor Platform-deployment script logs are now captured in both its dedicated log file and the systemd journal
1348197-9 4-Minor CVE-2016-2779 util-linux: runuser tty hijack via TIOCSTI ioctl
1348165-9 4-Minor CVE-2019-9893 in libseccomp is not applicable to this product release
1348157-9 4-Minor CVE-2018-6003 libtasn1: Stack exhaustion due to indefinite recursion during BER decoding
1346833-6 4-Minor CVE-2017-0553 libnl: Integer overflow in nlmsg_reserve()
1346821-9 4-Minor CVE-2020-13987: Open-iSCSI: OOB read in checksum calculation in uIP
1346797-9 4-Minor CVE-2019-15165 libpcap: Resource exhaustion during PHB header length validation
1346489-8 4-Minor CVE-2017-14502, CVE-2020-21674: libarchive: Off-by-one error in the read_header function and DOS with heap-based buffer overflow in lib archive-3.4.1dev
1346465-8 4-Minor CVE-2019-20387 libsolv: out-of-bounds read in repodata_schema2id in repodata.c
1306561-9 4-Minor CVE-2021-27218: glib2: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform
1186625-9 4-Minor CVE-2019-11360 iptables: buffer overflow in iptables-restore
1186621-9 4-Minor CVE-2019-20795 iproute: use-after-free in get_netnsid_from_name in ip/ipnetns.c
1186617-10 4-Minor CVE-2014-3564 gpgme: heap-based buffer overflow in gpgsm status handler
1186565-6 4-Minor CVE-2020-13645 glib-networking: GTlsClientConnection silently ignores unset server identity
1186517-9 4-Minor CVE-2015-8872 , CVE-2016-4804: dosfstools
1185573-8 4-Minor CVE-2019-9704
1185305-9 4-Minor CVE-2020-14367 chrony: Insecure writing to PID file
1184905-9 4-Minor CVE-2021-3468 avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket


Cumulative fixes from F5OS-A v1.8.3 that are included in this release


Vulnerability Fixes

ID Number CVE Links to More Info Description
2063565-1 CVE-2022-23219 K52308021, BT2063565 CVE-2022-23219: glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
2063545-1 CVE-2022-23218 K52308021, BT2063545 CVE-2022-23218: glibc: Stack-based buffer overflow in svcunix_create via long pathnames
2008753-2 CVE-2025-57780 K000156771 Privilege Escalation to Admin via SSH Port Forwarding
2008505-4 CVE-2025-61955 K000156771, BT2008505 F5OS SCP hardening
2000389-2 CVE-2018-10105 K000156675, BT2000389 CVE-2018-10105 - tcpdump: SMB data printing mishandled
1999777-2 CVE-2018-10103 K000156675, BT1999777 CVE-2018-10103 - tcpdump: SMB data printing mishandled
1998521-1 CVE-2021-3517 K03179547, BT1998521 CVE-2021-3517 libxml2: Out-of-Bounds Read in XML Entity Encoding Functionality
1962741-2 CVE-2023-31436 K000152785 CVE-2023-31436: kernel: out-of-bounds write in qfq_change_class function
1953653-3 CVE-2022-27406 K000141126, BT1953653 cve-2022-27406: Freetype: Segmentation violation via FT_Request_Size
1780617-1 CVE-2023-45288 K000148640 CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames
1630273-5 CVE-2023-4207 K000138693 CVE-2023-4207 - Centos Security Update for kernel
1630253-5 CVE-2023-4208 K000138693 CVE-2023-4208 - Centos Security Update for kernel
1598633-5 CVE-2023-45288 K000148640, BT1598633 CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames
1381205-3 CVE-2023-39325, CVE-2022-41723, CVE-2023-44487 K000152389, BT1381205 CVE-2023-39325 - HTTP/2 rapid reset
1381177-4 CVE-2023-39325, CVE-2022-41723 K000152389, BT1381177 CVE-2023-39325 - HTTP/2 rapid reset
1231485-6 CVE-2020-17541 K000140960 CVE-2020-17541-libjpeg-turbo vulnerability
2078301 CVE-2025-60015 K000156796, BT2078301 Dagd may crash if a malicious message is sent from the tenant
1495337-1 CVE-2025-60013 K000154661, BT1495337 FIPS Password Initialization Failure with Special Characters
1171849-4 CVE-2022-2588 K32615023 CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
1093681-5 CVE-2022-0359 K08827426, BT1093681 CVE-2022-0359 vim: Heap-based buffer overflow in init_ccline() in ex_getln.c
1929309 CVE-2019-14834 K000152048, BT1929309 CVE-2019-14834-Dnsmasq vulnerability
1388777-4 CVE-2022-43750 K000139700, BT1388777 CVE-2022-43750: kernel: memory corruption in usbmon driver

Functional Change Fixes

None


F5OS-A Fixes

ID Number Severity Links to More Info Description
1975309-1 1-Blocking BT1975309 Logging from PAM modules only seen for SSH authentication, and not GUI/API authentication
1975273-4 1-Blocking BT1975273 RADIUS remote authentication specifying IPv6 server addresses does not work
1975245-1 1-Blocking BT1975245 In IPv6-only environment, remote authentication using RADIUS server by hostname may not work
1972357-3 1-Blocking BT1972357 BIG-IP Tenant's VM will be patched/relaunched everytime after system reboot/upgrade/failover/TPOB restart
1926489-1 1-Blocking BT1926489 L2 Port motion events are not generated for certain port combinations on r10k.
1813929 1-Blocking BT1813929 Insufficient memory on node, retrying tenant deployment
1250901-7 1-Blocking BT1250901 On rSeries FIPS system live upgrade, cavium_n3fips (liquidsec_pf_vf driver) may fail to come into operational state
2047717-1 2-Critical BT2047717 PlatformStatsBridge process crash
1976761-1 2-Critical BT1976761 System primary key is recreated when there is an error reading it from the hardware TPM
1934005-1 2-Critical BT1934005 Infrequent and uneven traffic to front panel LAGs can lead to premature aging of L2 events
1789117-2 2-Critical BT1789117 SNMP bulk queries for LAGs on VELOS might return incomplete information
1709121-3 2-Critical BT1709121 Unable to create a tenant as the Network Manager start-up or failover may result in a looping process
1673925-2 2-Critical BT1673925 Missing masquerade MAC FDB entry causes excessive DLFs following tenant failover.
1644221-1 2-Critical BT1644221 Log file grows to gigabytes (GBs) under /var/log
1591549-2 2-Critical BT1591549 Support for case-insensitive LDAP username lookup
1394205-2 2-Critical BT1394205 NTP CLI/webUI displays "ntp api, the server or underlying service is unreachable"
1341701-4 2-Critical BT1341701 Unable to launch tenant, as VF interface is getting incorrect name while attaching to tenant.
2106705 3-Major CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
2050869-2 3-Major CVE-2022-41721 x/net/http2/h2c: request smuggling
2050865-2 3-Major CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
2050861-2 3-Major CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
2050853-2 3-Major CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
2050845-2 3-Major CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
2050841-2 3-Major CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
2050833-2 3-Major CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
2050801 3-Major CVE-2017-16539 docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames
2050793 3-Major CVE-2024-36623 moby: Race Condition in Moby's streamformatter Package
2050789 3-Major CVE-2025-22868 golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
2050701 3-Major CVE-2025-58754 axios: Axios DoS via lack of data size check
2009765-1 3-Major BT2009765 Tcpdump may crash with "malloc(): corrupted top size" when using complex BPF filters
1998753-1 3-Major CVE-2021-3516 libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c
1998541-1 3-Major CVE-2021-3518 libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c
1998417-1 3-Major CVE-2022-29824 libxml2: Integer Overflow in Buffer Handling Functions Leading to Out-of-Bounds Writes
1998265-1 3-Major CVE-2021-3537 libxml2: NULL Dereference Due to Improper Error Handling in Mixed Content Parsing Ask Explain
1998233-1 3-Major CVE-2017-9047 libxml2: Buffer Overflow in xmlSnprintfElementContent
1997969-1 3-Major CVE-2017-16931 libxml2: Improper Handling of Parameter-Entity References
1996657 3-Major CVE-2022-2817 vim: heap use-after-free in string_quote() at src/strings.c
1996609 3-Major CVE-2022-3296 vim: out-of-bound write in function ml_append_int
1996593 3-Major CVE-2022-3234 vim: Heap-based Buffer Overflow
1996585 3-Major CVE-2022-2816 vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c
1996529 3-Major CVE-2022-2210 vim: out-of-bound write in function ml_append_int
1996329 3-Major CVE-2022-2580 vim: Out-of-bounds Read in vim
1996193 3-Major CVE-2022-2285 vim: integer overflow in del_typebuf() at getchar.c
1995929 3-Major CVE-2023-0433 vim: reading past the end of a line when formatting text
1995773 3-Major CVE-2022-3256 vim: use-after-free in movemark() at mark.c
1995661 3-Major CVE-2023-0512 vim: divide by zero in adjust_skipcol() at move.ca
1995613 3-Major CVE-2022-2207 vim: heap-based buffer overflow in function ins_bs
1995465 3-Major CVE-2022-2889 vim: use-after-free in find_var_also_in_script() in evalvars.c
1995445 3-Major CVE-2022-2287 vim: out of bounds read in suggest_trie_walk() at spellsuggest.c
1995353 3-Major CVE-2022-2581: vim: Out-of-bounds Read in vim src/regexp.c
1995349 3-Major CVE-2022-2571 vim: Heap-based Buffer Overflow in vim
1995341 3-Major CVE-2022-3352 vim: use after free
1995337 3-Major CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1995157 3-Major CVE-2022-2182 vim Heap-based Buffer Overflow
1995097 3-Major CVE-2022-2125 vim Heap-based Buffer Overflow
1995077 3-Major CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
1995037 3-Major CVE-2022-3705 vim: a use after free in the function qf_update_buffernt
1994969 3-Major CVE-2022-2946 vim-minimal-7.4.629-6.el7.x86_64.rpm: Use After Free in GitHub repository vim/vim prior to 9.0.0246
1994953 3-Major CVE-2022-2284 vim: out of bounds read in utfc_ptr2len() at mbyte.c
1994929 3-Major CVE-2022-2819 vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c
1994669 3-Major CVE-2023-0051 vim: heap-based buffer overflow in msg_puts_printf() in message.c
1994593 3-Major CVE-2020-14363 - libX11: Integer overflow leading to double-free in locale handling
1994517 3-Major CVE-2022-2126 vim: out of bounds read in suggest_trie_walk()
1994465 3-Major CVE-2022-2862 vim: heap use-after-free in generate_PCALL() at src/vim9instr.c
1994449 3-Major CVE-2023-0054 vim-minimal-7.4.629-6.el7.x86_64.rpm: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.
1959845-4 3-Major CVE-2022-48340: glusterfs: heap use-after-free in dht_setxattr_mds_cbk() in dht-common.c
1926585-1 3-Major BT1926585 High memory utilization by NetworkManager
1857245-1 3-Major CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange
1857197-2 3-Major CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange
1857077-1 3-Major CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange
1812497-4 3-Major BT1812497 Restoring a backup with an SNMP user on a system with a different SNMP Engine ID will duplicate the SNMP user
1782497-2 3-Major CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder
1780721-1 3-Major CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder
1779289-6 3-Major BT1779289 Error when creating a server-group name with an embedded space
1757461-1 3-Major BT1757461 ConfD encryption key is recreated when there is an error reading it from the hardware TPM
1673265-5 3-Major BT1673265 RADIUS remote auth on F5OS may not use system management IP as NAS IP address
1671629-2 3-Major BT1671629 [rSeries r2000/r4000] After F5OS reboot, tenant interfaces might be in UNINITIALIZED state
1598509-3 3-Major BT1598509 iHealth client can occasionally throw a core file
1195561-5 3-Major CVE-2022-3705 vim: a use after free in the function qf_update_buffer
1107361-3 3-Major CVE-2020-15113 etcd: directories created via os.MkdirAll are not checked for permissions
1575093-1 4-Minor BT1575093 Higher latency in R2K/4K appliances compared to iSeries appliances
1348297-3 4-Minor CVE-2020-15113, CVE-2020-15114, CVE-2020-15115 - etcd Vulnerabilities
1348189-3 4-Minor CVE-2020-13790 libjpeg-turbo: heap-based buffer over-read in get_rgb_row() in rdppm.c


Cumulative fixes from F5OS-A v1.8.2 that are included in this release


Vulnerability Fixes

ID Number CVE Links to More Info Description
1814053-3 CVE-2025-59778 K000151718, BT1814053 Orchestration Agent process may core
1814045-3 CVE-2025-59778 K000151718, BT1814045 Daemons that handle ZMQ messages may crash under certain conditions.
1607745-8 CVE-2024-38474, CVE-2024-38475, CVE-2024-38476 K000140618 Apache HTTPD vulnerabilities CVE-2024-38476, 2024-38474 and CVE-2024-38475
1691557-5 CVE-2020-8037 K000149929 CVE-2020-8037: tcpdump memory leak.
1628557-6 CVE-2025-47150 K000149820, BT1628557 F5OS high memory usage when using snmp

Functional Change Fixes

None


F5OS-A Fixes

ID Number Severity Links to More Info Description
1624777-4 1-Blocking BT1624777 Tenants will not deploy since Orchestration Agent process is continuously generating a core
1890297-2 2-Critical BT1890297 Memory leak in l2_agent daemon on F5OS
1789141-3 2-Critical If 'ldap-group is configured for a role but LDAP search fails, users with the default GID for the role can still get those privileges
1782925-4 2-Critical BT1782925 Active Directory LDAP integration without uidNumber/gidNumber does not work after system reboot
1757617-1 2-Critical BT1757617 XBAR rate limit not updated when modifying LAG
1754097-1 2-Critical BT1754097 rSeries ATSE v72.41.6.00 firmware
1753469-3 2-Critical BT1753469 Add notification to set-version when downgrading the system from F5OS-A/C-1.8.0
1713485-1 2-Critical BT1713485 RSeries ATSE v72.5.6.00 firmware
1713073-4 2-Critical K000148566, BT1713073 F5OS rSeries spontaneous reboot after upgrade
1697237-2 2-Critical BT1697237 Partition volumes IMAGES, shared are not present in partition snmpwalk output. in hrStorageDescr in HOST-RESOURCES-MIB
1694481-3 2-Critical BT1694481 K3s token expiry causing tenant unresponsiveness
1635729-1 2-Critical BT1635729 Restrict Multiple STP protocol selection
1630009-2 2-Critical BT1630009 F5 rSeries NSO firmware v70.5.2.22
1630005-2 2-Critical BT1630005 F5 rSeries NSO firmware v70.5.2.11
1630001-2 2-Critical BT1630001 F5 rSeries NSO firmware v70.5.2.00
1629993-2 2-Critical BT1629993 F5 rSeries ASW firmware v71.5.2.22
1629985-2 2-Critical BT1629985 F5 rSeries ASW firmware v71.5.2.11
1629977-2 2-Critical BT1629977 F5 rSeries ASW firmware v71.5.2.00
1620077-6 2-Critical BT1620077 FDB entry port motion not working if new interface is a trunk/LAG
1601985-3 2-Critical BT1601985 F5OS unable to transmit frames out to external interface, even though link is reported as UP
1576345-3 2-Critical K000139339, BT1576345 Port mode mismatch on QSFP ports can cause interface flaps on other ports
1891301-3 3-Major CVE 2020-27743: pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes().
1857001-1 3-Major CVE-2025-27152: axios vulnerability
1730833-1 3-Major BT1730833 Tmm may egress broadcast traffic even when VLANs are disabled in F5OS
1660961-5 3-Major BT1660961 Active Directory LDAP integration without uidNumber/gidNumber does not work with LDAP over TLS
1644293-6 3-Major BT1644293 Interface status alert and SNMP trap is not sent immediately after interface is disabled
1636261-3 3-Major BT1636261 F5OS only supports configuration of 'ssh-rsa' SSH host key algorithm
1579181-3 3-Major BT1579181 Rate limit XBAR to sum of speeds of used interfaces
1321429-6 3-Major BT1321429 F5-PLATFORM-STATS-MIB::diskPercentageUsed not available.
1135845 3-Major BT1135845 Increased interval for boot device selector hot-key 'b' acceptance after the BIOS banner
1679941-4 4-Minor BT1679941 "gen error" while running snmpget/snmpbulkget commands


Cumulative fixes from F5OS-A v1.8.0 that are included in this release


Vulnerability Fixes

ID Number CVE Links to More Info Description
1614821-5 CVE-2024-3596 K000141008, BT1614821 CVE-2024-3596 - Blast-RADIUS
1620513 CVE-2024-38477 K000140784, BT1620513 CVE-2024-38477 httpd: NULL pointer dereference in mod_proxy
1388477 CVE-2025-46265 K000139503, BT1388477 Default GID group mapping authorized even when GID mapped to different group ID
1379845 CVE-2023-3341 K000137582, BT1379845 CVE-2023-3341:bind: stack exhaustion in control channel code may lead to DoS
1327689 CVE-2025-36546 K000140574, BT1327689 Manually remove root and user keys before entering Appliance Mode
1322817 CVE-2023-2828 K000135312, BT1322817 BIND vulnerability CVE-2023-2828
1292405-6 CVE-2022-25147 K000137702, BT1292405 CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64
1378313 CVE-2020-22218 K000138219, BT1378313 CVE-2020-22218: libssh2: use-of-uninitialized-value in _libssh2_transport_read
1353001 CVE-2025-43878 K000139502, BT1353001 tcpdump service improvements
1124953-2 CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
K04808933, BT1124953 Intel microcode updates: CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166
1577049 CVE-2024-1086 K000139430, BT1577049 CVE-2024-1086 - Linux kernel vulnerability
1057401 CVE-2018-16402 K21426934, BT1057401 CVE-2018-16402 libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service or possibly have unspecified other impact

Functional Change Fixes

ID Number Severity Links to More Info Description
1353161 3-Major BT1353161 Snmpd daemon stuck in loop deleting and recreating 'system snmp communities community' entry after recreating and deleting SNMP config a few times

F5OS-A Fixes

ID Number Severity Links to More Info Description
1614429 1-Blocking K000140362, BT1614429 iHealth upload is failing with error "certificate signed by unknown authority"
1582817-1 1-Blocking BT1582817 Unable to add rSeries device IP to 'known-hosts' file
1577193 1-Blocking BT1577193 Remote users logged out of WebUI session immediately after successful authentication
1572493 1-Blocking BT1572493 LAG Trunk Configuration is Missing Inside of Tenant
1572137-2 1-Blocking BT1572137 Upload/Download API should work with '/api' and '/restconf'
1496837-1 1-Blocking BT1496837 User-manager's ConfD socket getting closed.
1360905 1-Blocking BT1360905 Unexpected log messages in /var/log/boot.log post-integrity recovery
1359277 1-Blocking BT1359277 ConfD CLI timed out and subsequently sees Error: application communication failure
1351981 1-Blocking BT1351981 QAT count is not dynamically updated for active tenants after license upgrade
1338601-1 1-Blocking BT1338601 Tenant goes to INOPERATIVE state after rSeries reboot
1332781 1-Blocking BT1332781 A remote user with the same username as the local F5OS user will be granted the local user's roles
1233865-5 1-Blocking BT1233865 Memory capacity and utilization details are confusing / misleading
1208573-2 1-Blocking BT1208573 Disabling Basic Authentication does not block the RESTCONF GET requests
1637529 2-Critical BT1637529 RSeries ATSE v72.41.5.00 firmware
1637525 2-Critical BT1637525 RSeries ATSE v72.5.5.00 firmware
1617125 2-Critical BT1617125 Production license manual activation failed on F5OS-A 1.7.0
1612405-1 2-Critical BT1612405 LACP status shows UP in BIG-IP tenant even if its down on F5OS.
1596625-2 2-Critical BT1596625 BE2 GCI interface training failures during runtime results in failure to process networking traffic
1596149 2-Critical BT1596149 Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures
1591645-1 2-Critical BT1591645 EPVA related dma-agent crash
1587925 2-Critical BT1587925 Modifying a RADIUS server from the web UI requires the Secret to be configured or re-entered
1585001-1 2-Critical BT1585001 Radius authentication does not work when the shared secret key in the radius configuration is more than or equal to 32 characters
1580489 2-Critical BT1580489 BE2 GCI interface training issue results in failure to process networking traffic
1575925-1 2-Critical BT1575925 Running 'show system aaa primary-key state status' while a key migration is in progress can cause key migration errors
1575417 2-Critical BT1575417 Platform-diag-agent memory leak
1566569-1 2-Critical BT1566569 Unable to access rSeries system from 172.17.0.0/16 IP subnet
1536413 2-Critical BT1536413 Allowed-ips allowed-ip <name> is not accepting the '-' in the names
1505589-1 2-Critical K000139300, BT1505589 Subject-Alternative-Name (SAN) feature now supports client-side SSL Validation
1498009-1 2-Critical BT1498009 Learned L2 entries in data-plane L2 forwarding table may disrupt some traffic flows between tenants
1497657 2-Critical BT1497657 First SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges
1496977 2-Critical BT1496977 Remote GID mappings to F5OS roles are disconnected for TACACS+/RADIUS authentication methods.
1494945 2-Critical BT1494945 ConfD Application Error when tenant interface stats are not available
1494809 2-Critical Allowing user to configure HostKeyAlgorithms parameters
1469401 2-Critical BT1469401 ARP request for mgmt interface IP resolving to mgmt0-system inferface's mac
1441333 2-Critical BT1441333 Rasdaemon memory leak
1436153 2-Critical BT1436153 F5OS upgrades fail when SNMP configuration contains special characters.
1429741 2-Critical BT1429741 Appliance management plane egress traffic from F5OS-A host going via BIG-IP Next tenant management interface instead of host management when both are in same subnet
1411137 2-Critical BT1411137 Audit log entries are missing when creating or deleting objects via UI or API
1401841 2-Critical BT1401841 Out of memory issues are seen when multiple telemetry exporters are configured
1400221 2-Critical BT1400221 OpenTelemetry exporters may not produce data upon first tenant being added to system
1398889 2-Critical BT1398889 rSeries r5000: assertion in qat-device-plugin FilteringResourceEventHandler.OnDelete causing k8s panic
1398341 2-Critical BT1398341 The affinity script crash seen in /var/log/cron logs
1398145 2-Critical BT1398145 The 'file list' command takes a long time and the webUI is stuck in loading
1394905 2-Critical BT1394905 Unable to create AOM user
1394857 2-Critical BT1394857 Cannot retrieve AOM username after creating it
1390425-1 2-Critical BT1390425 Libvirt core is generated on downgrade from 1.7.0 -A to 1.6.0 -A
1379865 2-Critical BT1379865 F5 rSeries ATSE2 v72.5.3.00 firmware
1378805 2-Critical BT1378805 Error occurs when changing LAG type for an existing LAG interface on webUI
1365985 2-Critical BT1365985 GID role mapping may not work with secondary GID
1365821 2-Critical BT1365821 Traffic loss of 5-10 seconds after disable/enable of LACP Lag member on r5000/r10000
1361117 2-Critical BT1361117 ha-1-deployment pod may get restarted when tenant HA is configured
1355277-2 2-Critical BT1355277 Incorrect Vlan Listeners when a Static FDB is configured
1354373-1 2-Critical BT1354373 WebUI malfunctions when navigating to HSM Details with inactive FIPS drivers
1352045 2-Critical BT1352045 Not able to connect to tenant console via virtctl after upgrade
1348145 2-Critical BT1348145 Observing 'Failed to send restarting msg to VF' during reboot with tenants deployed causing reboot time to increase
1341869-1 2-Critical BT1341869 Failed to delete tenant pods
1332997 2-Critical BT1332997 Device stuck at "unmounting containers" after performing reboot
1328405 2-Critical BT1328405 F5OS system stopped generating tmstat snapshots
1327137 2-Critical K000138753, BT1327137 Interfaces take longer than expected to come up
1325893 2-Critical BT1325893 A vqfdm system software core file is occasionally observed on system reboot
1320637-2 2-Critical BT1320637 DMA Agent crash after SEP file mapping error
1304921 2-Critical BT1304921 F5OS file download API does not work with basic authentication
1304765-3 2-Critical BT1304765 A remote LDAP user with an admin role is unable to make config changes through the F5 webUI
1300749 2-Critical K000135373, BT1300749 Syslog target files do not use the hostname configured via system user interface.
1297357-1 2-Critical WebUI authentication does not follow best practices in some situations
1296997 2-Critical BT1296997 Large core files can cause system instability
1282493-3 2-Critical BT1282493 Crypto devices are not released after tenants are deleted
1251989 2-Critical BT1251989 Changing the system Date/time back and forth using NTP server brings the system to abnormal state
1207889 2-Critical BT1207889 FEC configuration on r5k/r10k 25G interfaces
1204985 2-Critical BT1204985 The root-causes of F5OS upgrade compatibility check failures are hidden in /var/log/sw-util.log.
1167477-5 2-Critical CVE-2021-20233: grub2 - Heap out-of-bounds write due to miscalculation of space required for quoting
1154733 2-Critical BT1154733 LLDP error on management interface
1126865-2 2-Critical BT1126865 F5OS HAL lock up if the LCD module is not responding.
1099069-3 2-Critical BT1099069 Issues with pulling files from F5OS device using SCP
1671517 3-Major BT1671517 WebUI Dashboard Memory & Storage Statistics are inaccurate and misleading
1612217 3-Major BT1612217 A large amount of SPVA DoS allow list entries can overload DMA-Agent causing a tenant to fail to pass traffic
1603661-1 3-Major BT1603661 SysDescr value returns empty string under SNMPwalk, after performing backup/restore configuration
1593385-3 3-Major BT1593385 F5OS Tenant Throughput (bits/packets) and TMM CPU usage higher than expected until VLAN is added or removed
1591553-1 3-Major BT1591553 Including /etc/resolv.conf and /etc/hosts files in QKView capture
1590173 3-Major BT1590173 K3s server crashes and restarts due to high CPU activity
1588961 3-Major BT1588961 Observing "Failed to find the service account - robottpobdefault" or "Creating SA robottpobdefaultfailed" log messages in platform.log
1588093 3-Major BT1588093 Forwarding host log files to remote targets
1587837-3 3-Major BT1587837 Memory leak in multiple components
1585853-2 3-Major BT1585853 Telemetry streaming pauses if mgmt-ip gets updated
1585765 3-Major BT1585765 Error message IDs for appliance-orchestration-manager are incorrect
1585749 3-Major BT1585749 Including lspci commands in QKView capture
1583233 3-Major BT1583233 The 'show portgroups' command may not display DDM statistics, or may display stale/out-of-date DDM statistics
1582553 3-Major BT1582553 The 'components component state' data is not displayed in ConfD.
1580165 3-Major BT1580165 Removing a failed patch ISO can remove base services imported from a different ISO
1579453 3-Major BT1579453 SAN Validation Mismatch: Key/Cert virtual server No Key Configured
1579289 3-Major BT1579289 Empty log message when interface changes state
1578553 3-Major BT1578553 Tenant deployment fails with error: "Error mapping SEP file. Unlinking. Disconnecting client."
1576141 3-Major BT1576141 K3S installation fails if /var/log/appliance.log is not present
1573493 3-Major BT1573493 Qkview does not collect the files gid-map.txt, /etc/libnss-udr/passwd, or /etc/libnss-udr/group
1572929 3-Major BT1572929 Changing remote authentication methods from RADIUS/TACACS to LDAP may break remote-gid functionality.
1572597 3-Major BT1572597 System loses its mgmt-ip address after switching between static and dynamic allocation (DHCP) of IP and rebooting
1572489 3-Major BT1572489 User accounts with username which includes only numeric values or special characters like "." or ".." or starts with '-' are inactive
1567945 3-Major BT1567945 QAT entries for the deleted tenant still show up in cluster
1566925 3-Major BT1566925 Remove unhelpful troubleshooting files from QKView
1560533-1 3-Major BT1560533 Inconsistent case values (upper and lower case) for different F5OS-C SNMP OIDs
1558797 3-Major BT1558797 BMC self health test falsely logged as failed
1552945 3-Major BT1552945 Tenant images renamed with bracket are not supported
1550413-1 3-Major BT1550413 System events visible in the CLI may not be visible in the GUI
1549753 3-Major BT1549753 System telemetry exporter send queue and retry settings are causing memory issues
1519869 3-Major BT1519869 BIG-IP tenant reports blank interface
1505221-2 3-Major BT1505221 If accidentally import bad ISO images, it may not removed automatically
1496397-1 3-Major BT1496397 Allowing entry of a Subject-Alternative-Name (SAN) for certificate and CSR creation
1496393 3-Major BT1496393 A key can be created rather using a stored key for CSR creation
1492621-2 3-Major BT1492621 Config-restore fails when backup file has expiry-status field for admin or root user
1492401 3-Major BT1492401 User with operator role is not having read-access to all pages
1490753 3-Major BT1490753 A linkUp and linkDown traps are sent when an up interface is disabled, and vice versa
1486697 3-Major BT1486697 Configuring Expiry-status of root and admin users should not be allowed
1481797 3-Major BT1481797 Voltage sensor limits incorrect, causing notice messages on r2000 & r4000 appliances
1472917 3-Major BT1472917 LDAP authenticated admins logging in via the serial console may have trouble disabing appliance mode during system instability
1470917 3-Major BT1470917 LAG aggregated speed is not updated
1469385 3-Major BT1469385 GUI freezes during LDAP user authentication if no remote GID mapped locally.
1468545 3-Major BT1468545 Inconsistency with time zones displayed in log files
1467273 3-Major BT1467273 LCD restarting internal services periodically due to memory allocation error.
1466397-1 3-Major BT1466397 LDAP authentication is consuming several minutes to authenticate via GUI and SSH.
1461289-1 3-Major BT1461289 On a rSeries appliance, config-backup proceed is broken
1461109 3-Major BT1461109 GUI error "Unable to get data from stream streams/platform-stats/json"
1455913 3-Major BT1455913 Tcpdump on F5OS does not honor the -c flag
1451181 3-Major BT1451181 The Rest API call to list core files returns 500 error when no core files found.
1437765-2 3-Major BT1437765 Restoration of system configuration database may fail if admin user was previously modified
1429721 3-Major BT1429721 SCP as non-root user does not report errors correctly for bad/non-existent files.
1420481 3-Major BT1420481 Observing continuous log messages "Found correct SSH ECDSA key in authorised keys." in /var/log/messages
1410445 3-Major BT1410445 The system's power state may be incorrectly indicated by the Status LED
1408477 3-Major BT1408477 When more than one PCIe AER error has occurred, diag-agent reports this as a "RAS AER 'unknown' error" instead of the individual AER errors.
1403817-1 3-Major BT1403817 SNMP IF-MIB misreport the status and speed of LACP LAGs
1403781 3-Major BT1403781 Modifying mgmt interface's description will trigger interface flapping
1403749 3-Major BT1403749 Memory leaks in tcam-manager
1401621 3-Major BT1401621 Modifying a remote server with multiple selectors from the web UI removes the AUTHPRIV configuration.
1397145 3-Major BT1397145 Unable to add blade to Openshift cluster if VELOS partition root password is expired or locked
1394993-1 3-Major BT1394993 Upon configuration changes, the l2-agent container restarts with a core.
1394913-1 3-Major BT1394913 Rare LACPD crash during process termination
1394045 3-Major BT1394045 Misleading "unable to read AOM SSH login banner" errors are found
1393669 3-Major BT1393669 On adding a member to an existing LAG on webUI, the newly added member's speed does not add up to the LAG's "Current Speed" instantly and requires a reload to see the expected response
1393269 3-Major BT1393269 Error log: "PINGLOOP Failed to ssh to 127.0.0.1"
1391625 3-Major BT1391625 Hugepages do not get de-allocated after BIGIP NEXT tenant HA disassembly
1388961 3-Major BT1388961 A few SEL entries in /var/log/platform/sel have missing details
1388945 3-Major BT1388945 Fan speed randomly shows as '0'.
1388745 3-Major BT1388745 Large numbers of platform-hal errors logged in platform.log: "Requested Sensor, data, or record not present."
1381661 3-Major BT1381661 LDAP external authentication fails if there is no group definition for user's primary GID
1381277 3-Major BT1381277 Most recent login information is not displayed in F5OS webUI
1381109 3-Major WS-2022-0322 - d3-color 2.0.0 package
1381057 3-Major BT1381057 Opening and closing preview pane is causing the page scrollbar to disappear on View Tenant Deployments screen
1379625 3-Major BT1379625 Changing the max-age attribute in password policy is not reflecting immediately
1379565-1 3-Major BT1379565 Observing QKView start from 100% and then going back to 1%
1377257 3-Major BT1377257 Qkview can crash collecting telemetry database
1375133 3-Major BT1375133 K3S is getting reinstalled after live upgrade, even though there is no K3S version change
1366417-3 3-Major BT1366417 Long BIG-IP tenant names will cause not having virtual console access
1366337 3-Major BT1366337 Adding a system raid drive fails after successful removal
1366157 3-Major BT1366157 Warning needed about creating tenant with same name as existing user account name
1365977 3-Major BT1365977 Container daemons running as PID 1 cannot be cored on-demand
1359897 3-Major BT1359897 rSeries link down events can be missed
1355113-1 3-Major BT1355113 VELOS software upgrade does not inform about KubeVirt component upgrade
1354341 3-Major BT1354341 Changing a VLAN from trunked (tagged) to native (untagged) on a LAG in a single transaction can cause traffic outage
1354329 3-Major BT1354329 Unable to access tenant through console access.
1354053 3-Major BT1354053 Suppress LOP SEEPROM object did not find errors during re-licensing
1353085 3-Major BT1353085 Configure admin/operator roles in LDAP without uidNumber or gidNumber attributes
1352845 3-Major BT1352845 Some internal log content may not appear in external log server
1352449 3-Major BT1352449 iHealth upload is failing with error "certificate signed by unknown authority"
1352421 3-Major BT1352421 L2 services (LACP/LLDP) are down on r2000 and r4000 series appliances
1352353-3 3-Major BT1352353 Remove integrity-check configurable option from CLI
1351893-2 3-Major BT1351893 ConfD Logging 'Failed to change working directory' Error Message
1351541-4 3-Major BT1351541 Unable to remove the ISO images that share the same minor version with the running version
1351529 3-Major BT1351529 Fixing the log issue stating "UNSUPPORTED STP state" when STP global is configured
1349977 3-Major BT1349977 Setup wizards fails and immediately exits if it is given incorrect credentials.
1349953 3-Major BT1349953 Setup wizard script gives an "All IP addresses must be unique" error when NTP and DNS servers match
1348989 3-Major BT1348989 GUI virtual server CLI has different limitations for days-valid
1348509 3-Major BT1348509 Incorrect file path reported in the telemetry log records
1348093 3-Major BT1348093 Appliance-setup-wizard traceback on invalid NTP input
1341909 3-Major Command 'show component' does not show psu-power-in and psu-power-out in CLI and API
1341521 3-Major BT1341521 Incorrect subnet mask returned for GET call for /systems
1338521 3-Major BT1338521 Unable to login when accessing F5OS GUI through a network proxy on a port other than 443.
1338505 3-Major BT1338505 Qkview is not collecting log data from kubernetes pods
1332293 3-Major BT1332293 Tcpdump performed with an interface filter on VELOS or rSeries will show broadcast traffic from all interfaces
1329797 3-Major BT1329797 RADIUS user logs in through the WebUI without configuring the F5-F5OS-UID, will be disconnected after 10 minutes
1329449-1 3-Major BT1329449 Missing days-valid, store, and key type logging items of a certificate
1329021-2 3-Major BT1329021 Display order of interfaces/portgroups in ConfD CLI are not in numerical order
1326125 3-Major BT1326125 RADIUS authentication fails if F5-F5OS-HOMEDIR attribute is not specified
1324269 3-Major BT1324269 LCD "System - Power On" option may not be available immediately after system is powered off
1324257 3-Major BT1324257 4600 does not boot up after a shutdown
1322685 3-Major BT1322685 Tcpdump sessions are terminated when interfaces are enabled or disabled.
1316097-4 3-Major BT1316097 LAGs not programmed when adding VLAN to LAG
1307577-2 3-Major BT1307577 Add more resilience to the file download API
1307565-2 3-Major BT1307565 The file download API is not working with the x-auth-token header
1306233 3-Major Low mixed IPv4/IPv6 performance
1305005 3-Major BT1305005 Error handling in F5OS file-download API
1304085-1 3-Major BT1304085 Unable to set local user's password if the same user exists on a remote LDAP server
1294561 3-Major BT1294561 When OCSP is disabled, configurations are not accurately shown outside of 'config' mode
1293249 3-Major BT1293249 AAA server group Port and Type are not displayed on ConfD
1291513 3-Major BT1291513 Some log messages/timestamps do not observe configured timezone
1289861 3-Major BT1289861 Ability to suppress the proceed warning generated when portgroup mode is changed
1288897-2 3-Major BT1288897 Allowed IP rule name, which contains all underscores, will be deleted while upgrading to F5OS-A 1.7.0 and later versions
1288765 3-Major BT1288765 Provide ability to manage services through systemd/docker commands from F5OS CLI
1287245-2 3-Major BT1287245 DAGD component crashes during live upgrade or downgrade
1286153 3-Major BT1286153 Error logs while generating the qkview
1282185-2 3-Major BT1282185 Unable to restore backup file containing expired TLS certificate
1277429-1 3-Major BT1277429 Operational and Configurational prompts do not persist through user sessions
1270309 3-Major BT1270309 Audit.log may log incorrect username initially for users logging into the CLI, remotely-authenticated users may see hostname in prompt reported as "appliance-1", and remotely-authenticated LDAP users may experience lengthy delays when authenticating
1268433 3-Major BT1268433 Some firewall rules do not generate denial logs
1251957 3-Major SNMP OIDs to monitor serial number of the device, type of hardware and hostname
1251161-2 3-Major BT1251161 Authentication fails via the webUI when “:” is at the end or beginning of the password
1250925 3-Major BT1250925 Alarm for AOM fault due to "LOP Runtime fault detected: lop:nc-si-rmii:failure"
1238245 3-Major BT1238245 Prevent system upgrade during firmware update
1211233-4 3-Major BT1211233 F5OS dashboard in webUI displays the system root file system usage, not the entire disk
1205409 3-Major BT1205409 Cannot export or download files from diags/shared/tcpdump path
1196417 3-Major BT1196417 First time user SSH session is getting closed after password change
1188825 3-Major New role named "user" with read-only access to non-sensitive system level data
1188069 3-Major BT1188069 F5OS installer does not indicate progress or completion state
1185805-1 3-Major BT1185805 The "test media" option during USB install may be interrupted by the hardware watchdog
1162341 3-Major BT1162341 Front panel interface status is not reported in alarms or events
1145049 3-Major BT1145049 K3s cluster deployment sequence is modified to avoid pods entering into UNKNOWN state
1140577 3-Major BT1140577 config-restore will cause a reboot if the portgroup configuration changes
1136557 3-Major BT1136557 F5OS config restore fails if .iso or components vary between two devices.
1135021 3-Major BT1135021 F5OS config-restore with an incorrect primary-key does not produce a warning
1124853-1 3-Major BT1124853 Backup and restore fails when port-profile is mismatched
1124809 3-Major BT1124809 Add or improve the reporting status of imported images
1008701-1 3-Major BT1008701 Using curl to access 'scp:' URIs on the partition management IP does not work
1505293-1 4-Minor BT1505293 Partition image removal message is truncated
1441425 4-Minor BT1441425 The rSeries appliance log shows "PSU voltage out value < lower limit, value=0".
1411101 4-Minor BT1411101 "Error pf_nic_get_media" failed error for ports with or without SFP connected
1401965-1 4-Minor BT1401965 Copying BIG-IP ISO to /var/import/staging/, leaves ISO loopback mounted
1399929-1 4-Minor BT1399929 F5OS permits non-existent ethernet interfaces to be configured
1349001 4-Minor BT1349001 F5OS VELOS is polled as Unix device by SNMP using BMC Discovery
1330429 4-Minor BT1330429 Port Mappings screen on webUI displays "GB" for bandwidth instead of "Gb"
1322921 4-Minor BT1322921 FEC configuration support for 25G interfaces on r2000/r4000
1297349 4-Minor Tightening controls on uploading files to F5OS
1147673 4-Minor BT1147673 Downloading QKViews directly from the System Reports screen.
1128633-3 4-Minor BT1128633 Failed upload entries displayed under CLI file transfer-operations
1121921 4-Minor BT1121921 Common name for setup-wizard tool across platforms
1284389 5-Cosmetic BT1284389 Show system health reports unhealthy during bootup

Cumulative fix details for F5OS-A v1.8.4 that are included in this release

2261661 : CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip

Component: F5OS-A

Symptoms:
A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and impacts system availability.

Conditions:
Need local access

Impact:
a panic can occur due to stack exhaustion and impacts system availability.

Workaround:
restrict the local access

Fix:
updated go version in which this CVE fixed.


2261657 : CVE-2022-28131 - Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.

Component: F5OS-A

Symptoms:
Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows to cause a panic due to stack exhaustion via a deeply nested XML document.

Conditions:
NA

Impact:
It can lead to a denial of service by crashing the effected services.

Workaround:
NA

Fix:
Go version has been updated to a non-vulnerable version.


2228961-1 : CVE-2026-25749 : Vim: Arbitrary code execution via 'helpfile' option processing

Component: F5OS-A

Symptoms:
Vim's tag file resolution logic allows a local attacker to achieve a out-of-bounds write. By providing a specially crafted helpfile option value a local user can trigger a heap buffer overflow, as consequence lead to memory corruption presenting a data integrity impact or leading the vim process to crash resulting in availability impact. Although being non-trivial and very complex, arbitrary code execution is not discarded as worst case scenario.

Conditions:
a local user provides or opens a specially crafted 'helpfile' option value or help/tag file

Impact:
Leading to impact on confidentiality, integrity, and availability, within the privileges of the local user.

Workaround:
N/A

Fix:
updated to the fixed version


2227221-3 : F5OS tpm-integrity-status is Unavailable on certain versions released since October 2025

Links to More Info: BT2227221

Component: F5OS-A

Symptoms:
When you run show components component state tpm-integrity-status, the TPM integrity status reports "Unavailable"

# show components component state tpm-integrity-status

          TPM
          INTEGRITY
NAME STATUS
-----------------------
platform Unavailable

Conditions:
-- Running the tpm-integrity-status command from F5OS-A or F5OS-C on rSeries or VELOS:
- VELOS systems running F5OS-C versions 1.8.2, 1.8.2-EHF, or 1.6.4
- rSeries systems running F5OS-A versions 1.8.3, 1.8.3-EHF, or 1.5.4
- EHFs built after October 15, 2025, including EHFs posted to MyF5 downloads in October such as:
  - F5OS-A-1.8.3-23493.R5R10.EHF-1
  - F5OS-C-1.8.2-28324.CONTROLLER.EHF-1
  - F5OS-C-1.8.2-28324.PARTITION.EHF-1

-- The calendar date is on or after April 4, 2026

Impact:
The tpm-integrity-status output reads Unavailable after April 4th, 2026.

Workaround:
If it is before April 4, 2026, you can run 'show components component state tpm-integrity-status' to get the TPM status.


2219813-3 : Empty File path in upload api leads to core

Links to More Info: BT2219813

Component: F5OS-A

Symptoms:
The utils-agent service crashes

Conditions:
Provide an empty file path to the upload api

Impact:
Utils-agent crashes and generates a core.

Workaround:
None

Fix:
Empty/Null check added for file path field in upload api to make sure no crash in utils-agent service.


2218489-2 : CVE-2025-38085 kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race

Component: F5OS-A

Symptoms:
Unexpected memory access behavior may occur due to race conditions in huge page management

Conditions:
Occurs on vulnerable kernel versions during concurrent memory operations involving huge pages (hugetlb) and fast page pinning (GUP-fast)

Impact:
May lead to unintended access to memory belonging to another process, potentially exposing sensitive information

Workaround:
N/A

Fix:
Fixed


2218469-1 : CVE-2025-39817: kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

Component: F5OS-A

Symptoms:
A slab-out-of-bounds exists in the linux kernel in efivarfs_d_compare, such that the issue can be triggered by parallel lookups using an invalid filename due to an incorrect memcmp function.

Conditions:
Occurs during concurrent efivarfs lookups with malformed or invalid EFI variable filenames, typically requiring local privileged access

Impact:
May lead to kernel instability or crash.

Workaround:
N/A

Fix:
The kernel has been updated to the fixed version.


2218437-1 : CVE-2025-37797: kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling

Links to More Info: K000160078


2218133-1 : CVE-2026-0915: glibc: glibc: Information disclosure via zero-valued network query

Component: F5OS-A

Symptoms:
A flaw was found in glibc, the GNU C Library. When an application calls the getnetbyaddr or getnetbyaddr_r functions to resolve a network address, and the system's nsswitch.conf file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents.

Conditions:
DNS must be enabled in nsswitch config.

Impact:
Sensitive data gain.

Workaround:
NA

Fix:
Fixed


2211261-1 : Enable login-attribute to work with UPN based authentication in F5OS

Component: F5OS-A

Symptoms:
Authentication using userPrincipalName is not enabled by default in F5OS.

Conditions:
In F5OS, When configured active_directory to true and trying to authenticate the user with userPrincipalName instead of sAMAccountName will fail.

Impact:
Authentication using userPrincipalName will fail in F5OS for active directory based remote authentications.

Workaround:
1. Configure login-attrribute to userPrincipalName from ConfD CLI as below:
system aaa authentication ldap login-attrribute userPrincipalName

2. For client based UPN authentication -
   a. Client Certificates should have been generated using UPN name
   b. Configure in which field we need to fetch username in confd via "system aaa authentication clientcert config client-cert-name-field"
   c. Configure login-attribute as userPrincipalName in confd via "system aaa authentication ldap login-attrribute userPrincipalName"



Note:
We can configure login-attribute via confd cli or restconf api. In this release there is no support to configure login-attribute from GUI.

Fix:
Added configurable parameter in confd to enable "userPrincipalName" based authentication.


2209005-1 : TLS client authentication for LDAP servers not working

Links to More Info: BT2209005

Component: F5OS-A

Symptoms:
F5OS does not authenticate to LDAP servers.

Conditions:
- LDAP authentication in F5OS configured to use a client certificate and key ("system aaa authentication ldap tls_cert" and "system aaa authentication ldap tls_key").
- Either or both of the following:
-- An LDAP group mapping is configured (ldap-group specified for a role)
-- Active Directory enabled and Unix Attributes disabled

Impact:
F5OS is unable to connect to the LDAP server

Workaround:
None


2207865-1 : Snmpwalk misses LAG interface stats intermittently

Links to More Info: BT2207865

Component: F5OS-A

Symptoms:
Though the LAG interface is configured in system, some stats for the LAG interface will be missed in snmpwalk output intermittently.

Conditions:
Issue is rarely observed when running snmpwalk in a loop continuously.

Impact:
Snmpwalk may not display all statistics for the LAG interfaces.

Workaround:
Run snmpwalk after a 20 second delay.

Fix:
Ensured all LAG interface statistics are properly reported in SNMP walk output.


2201365-1 : Intermittent webUI startup failure after F5OS v1.8.x upgrade caused by SSL certificate generation issue

Component: F5OS-A

Symptoms:
In rare cases after upgrading to F5OS v1.8.x, the Web GUI (httpd) may fail to start. System logs may show a missing ServerName directive, and the /etc/auth-config/default/f5os.cert file may be missing or zero bytes.

Conditions:
This issue can occur in certain scenarios where the upgrade process fails to properly generate or retain the f5os.cert certificate file, and the authentication-manager does not recover from the missing or empty certificate, resulting in an invalid httpd configuration.

Impact:
The webUI is completely unavailable. CLI and API access remain functional.

Workaround:
Restart the authentication-mgr and http-server services using the following CLI command:
 
system diagnostics os-utils docker restart node platform service authentication-mgr

system diagnostics os-utils docker restart node platform service http-server


2201053-1 : WebUI Connection may be refused After Upgrading to version F5OS-A 1.8.3

Component: F5OS-A

Symptoms:
After upgrading from version 1.5.3 to 1.8.3, access to the WebUI is no longer available. All connection attempts result in a "connection refused" error.

Conditions:
Occurs when upgrading from v1.5.3 to v1.8.3

Impact:
WebUI becomes inaccessible.

Workaround:
None.


2198665-2 : CVE-2021-3737: python: urllib: HTTP client possible infinite loop on a 100 Continue response

Links to More Info: K000159893


2183789-1 : FDB entries may expire when multiple entries hash to the same FPGA table index and traffic is intermittent

Links to More Info: BT2183789

Component: F5OS-A

Symptoms:
L2/FDB entries may expire even when traffic is arriving at the FPGA of the Appliance or VELOS Blade.

Conditions:
L2 entries which internally hash to the same table index inside the FPGA can lead to the expiration of the entry when traffic is arriving on intervals of more than 30 seconds from that MAC address. On each interval, an age refresh message might be lost, leading to decrement the age of the entry on 30 seconds. When the entry reaches the last period it will expire, and then it will be re-learnt again.

Impact:
The expiration of the FDB entry can lead to Destination Lookup Failures that are rate-limited, i.e. traffic loss. Depending on the scenario this could lead to intermittent potential outages between the entry expires, and it is learnt again.

Workaround:
Create a static FDB entry for the MAC address that suffers expiration issues. See K000152328.

Ensure that traffic from the MAC address expiring arrives continuously under 30 seconds intervals.

Open a Support case and request an EHF.


2182497 : CVE-2025-38352: kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

Component: F5OS-A

Symptoms:
A race condition was found in the Linux kernel’s POSIX CPU timer handling, where handle_posix_cpu_timers() may run concurrently with posix_cpu_timer_del() on an exiting task which could result in use-after-free scenarios. An attacker with local user access could use this flaw to crash or escalate their privileges on a system.

Conditions:
NA

Impact:
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Fix:
Kernel has been updated to a non-vulnerable version.


2181821-1 : CVE-2025-38614 kernel: eventpoll: semi-unbounded recursion

Component: F5OS-A

Symptoms:
A flaw in the Linux kernel eventpoll subsystem allows a local unprivileged user to create deeply nested epoll structures, leading to excessive recursion and potential kernel stack exhaustion, resulting in a denial of service

Conditions:
a local unprivileged user creates deeply nested epoll file descriptor chains via standard epoll system calls

Impact:
resulting in denial of service; no impact to confidentiality or integrity

Workaround:
N/A

Fix:
Fixed


2181801-1 : CVE-2025-38498 kernel: do_change_type(): refuse to operate on unmounted/not ours mounts

Component: F5OS-A

Symptoms:
A flaw in do_change_type() allowed a process to change mount propagation flags on mounts outside its own mount namespace, breaking expected isolation guarantees. This could enable a local attacker with mount privileges to disrupt or alter mount behavior in other namespaces, potentially causing system-wide denial of service.

Conditions:
NA

Impact:
denial of service

Workaround:
N/A

Fix:
updated to fixeed version


2181757-1 : CVE-2022-50367 kernel: fs: UAF/GPF bug in nilfs_mdt_destroy

Links to More Info: K000158972


2181681-1 : CVE-2023-53373 kernel: crypto: seqiv - Handle EBUSY correctly

Links to More Info: K000159889


2171937-1 : The Virtual Server is not receiving traffic due to an incorrect VLAN update from F5OS platform

Links to More Info: BT2171937

Component: F5OS-A

Symptoms:
When a specific native VLAN is configured for a port in virtual-wire, the incoming packets still arrive with VLAN ID 4094, while the Virtual Server expects traffic with the configured VLAN ID.

Conditions:
Configuring a specific native vlan on a port and then configuring it in virtual-wire.

Impact:
When enabling/disabling virtual-wire mode on a port with a configured native VLAN, the port default VLAN was being set with values (4094 for vwire enable, 4095 for vwire disable), ignoring any existing native VLAN configuration.

Workaround:
Once the virtual-wire is configured on the port, if the remove and re-add the native vlans to the interfaces, the hardware should get programmed correctly.

Fix:
Added a fix such that ensure native VLAN configuration is respected and preserved throughout the virtual-wire lifecycle.


2162969-4 : CVE-2022-50356 kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails

Links to More Info: K000160222


2152949-2 : Disabled ports or port mode mismatchs can cause bad register reads.

Links to More Info: BT2152949

Component: F5OS-A

Symptoms:
When a Front panel port is disabled or the port mode is mismatched, it can cause incorrect register reads. This may manifest as port interface flapping on other unrelated ports.

Conditions:
Front Panel Port is disabled or a port mode mismatch, such as a 100GE optic installed when the port is configured for 40GE operating mode.

Impact:
The status on other interfaces may incorrectly show ‘down’ when the interface is ‘up’ or other unexpected behavior.

Workaround:
Enable all Front Panel ports, even those not in use, and ensure there are no port mode mismatches.

Fix:
Updated FPGA firmware is required for the fix.


2151413-2 : TACACS External Authentication Failure after a software upgrade

Links to More Info: BT2151413

Component: F5OS-A

Symptoms:
TACACS users are not able to login to the device.

Conditions:
TACACS+ server sends back an authorization reply with an auth status of 'PASS_REPL' (pass + *replace all attributes*) instead of 'PASS_ADD' (pass + *add* to attributes)

Impact:
TACACS users will be unable to log in when the server is configured under the specified conditions.

Workaround:
Avoid using PASS_REPL on Tacacs server.

Fix:
After upgrading device to latest EHF build, the issue is not reproduced.


2151269-1 : Prompt-statusd process occasionally cores

Links to More Info: BT2151269

Component: F5OS-A

Symptoms:
Occasionally the prompt-statusd daemon will core.

Conditions:
This can occur in prompt-statusd during normal operation.

Impact:
After core, service will restart the operation

Workaround:
None


2144597-1 : CVE-2023-45803: urllib3: Request body not stripped after redirect from 303 status changes request method to GET

Component: F5OS-A

Symptoms:
urllib3 may improperly retain HTTP request bodies during redirects (301/302/303) when converting requests to GET, potentially exposing sensitive data. Exploitation requires a compromised trusted service and is considered low risk.

Conditions:
N/A

Impact:
Potential exposure of sensitive data from HTTP request bodies to unintended endpoints during redirects

Workaround:
N/A

Fix:
updated to the fixed version


2132141-1 : Interface 8.0 on r2000 and r4000-series F5OS appliances does not join LACP LAG or transmit LLDP BPDUs after upgrade to F5OS-A 1.8.3

Links to More Info: BT2132141

Component: F5OS-A

Symptoms:
- Interface 8.0 has an operational status of UP
- Interface 8.0 does not join a LACP LAG.
- Interface 8.0 does not transmit any LLDP packets.
- Log messages similar to the following in the platform.log:

nic-manager[8]: priority="Err" version=1.0 msgid=0x720c000000000003 msg="Error NULL interface descriptor".

Conditions:
- Running an affected version of F5OS-A.
- An r2000-series or r4000-series appliance. This issue does not affect r5000-, r10000-, or r12000-series appliances.
- Interface 8.0 is in a LACP LAG.

Impact:
Interface 8.0 is not able to negotiate and join a LACP LAG

Workaround:
This issue is fixed in F5OS-A 1.8.3 EHF-1, which is available for download on MyF5: https://my.f5.com/manage/s/downloads?productFamily=F5OS&productLine=F5OS+Appliance+Software&version=1.8.3&container=1.8.3-EHF


2131773-1 : Error message IDs for image-agent do not match those documented in the error catalog

Links to More Info: BT2131773

Component: F5OS-A

Symptoms:
Some of the message ids logged by the image-agent service in platform log do not match the error message id in the catalog.

Conditions:
Looking up image-agent logs by ID in the error message catalog.

Impact:
This discrepancy makes it difficult to correlate system logs with documentation for troubleshooting and support.

Workaround:
None

Fix:
Updated the error catalog message IDs correctly.


2131677-2 : PSU inventory data shows "Not Available" on F5OS-A

Links to More Info: BT2131677

Component: F5OS-A

Symptoms:
After PSU power test, F5OS reports PSU serial/part number as "Not Available" and shows empty state. Platform-hal logs "wrong common header format version: 0" and "wrong zero checksum 255 != 254" errors. PSU functions normally but inventory data unavailable.

Conditions:
Occurs after PSU power test/reseat
PSU FRU EEPROM corrupted
Failed to read the Seriel number.

Impact:
Incorrect PSU inventory display.

Workaround:
None


2131529-1 : CVE-2025-8058: glibc: Double free in glibc

Links to More Info: K000157129


2131429-1 : init_etile: Cable check failed

Links to More Info: BT2131429

Component: F5OS-A

Symptoms:
F5 rSeries Appliances may experience issues with port bringup when using an OPT-0036 in 4x10G bifurcated (breakout) mode. The system log will show an “init_etile: Cable check failed” message for one or more of the bifurcated ports. The system will not be able to establish a link on the port and the port status will remain down.

Conditions:
rSeries Appliance using an OPT-0036 in 4x10G breakout mode running F5OS-A-1.8.3 or earlier.

Impact:
Port remains down.

Workaround:
None. Requires F5OS update.

Fix:
Fixed in F5OS-A-1.8.3-25023-EHF-6 and later.


2131057-1 : CVE-2016-2148: Heap-based buffer overflow in the DHCP client, affecting BMC firmware

Links to More Info: K000156994


2130793-2 : CVE-2025-47268 iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping

Links to More Info: K000158112


2130773-4 : CVE-2025-48964 iputils: iputils integer overflow

Component: F5OS-A

Symptoms:
An integer overflow flaw has been discovered in the ping function within the iputils package. This overflow may allow an attacker to craft an ECHO reply which can prevent iputils from operating normally.

Conditions:
ping to the system.

Impact:
This issue may allow an attacker to craft an ECHO reply which can prevent iputils from operating normally.

Workaround:
NA

Fix:
Fixed


2107157 : OpenSSL security vulnerability (CVE-2025-9230)

Links to More Info: K000159887


2106705 : CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

Component: F5OS-A

Symptoms:
A flaw was found in the golang.org/x/oauth2/jws package in the token parsing component. This vulnerability is made possible because of the use of strings.Split(token, ".") to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of . characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.

Conditions:
Occurs when an affected version of the golang.org/x/oauth2/jws package is present and used for JWT token parsing.

Impact:
The affected service may experience elevated memory usage or degraded performance when handling specific input data.

Workaround:
NA

Fix:
The issue has been addressed by removing the unused golang.org/x/oauth2/jws service from F5OS.


2088601-1 : The anaconda-ssh service fails to start during installation phase, preventing remote SSH access

Component: F5OS-A

Symptoms:
SSH access is unavailable when using the inst.sshd boot parameter to enable remote debugging or Kickstart monitoring.

Conditions:
To enable SSH access and troubleshoot boot issues during the bare metal installation process.

Impact:
Blocks remote debugging over SSH during the bare metal installation process.

Workaround:
Need to trobleshoot through console only.

Fix:
Enabled the eno1 physical port and resolved the OpenSSL and OpenSSH compatibility.


2078301 : Dagd may crash if a malicious message is sent from the tenant

Links to More Info: K000156796, BT2078301


2063565-1 : CVE-2022-23219: glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname

Links to More Info: K52308021, BT2063565


2063545-1 : CVE-2022-23218: glibc: Stack-based buffer overflow in svcunix_create via long pathnames

Links to More Info: K52308021, BT2063545


2053301-2 : Upon reaching maximum memory capacity, BIG-IP tenant pods intermittently regenerated after a host reboot

Links to More Info: BT2053301

Component: F5OS-A

Symptoms:
BIG-IP Tenant Pods will keep restarting forever.

On host(root access)# kubectl get pods

Ex:
# kubectl get pods
NAMESPACE NAME READY STATUS RESTARTS AGE
default f5-resource-manager-jlv5q 1/1 Running 0 7h9m
default virt-launcher-v171x-1-xnk5s 1/1 Running 0 2m15s ==========>
default virt-launcher-v175x-1-24d9w 1/1 Running 0 2m4s ==========>
default virt-launcher-new-183-tenant-1-2nz9q 0/1 Running 0 15s ===========>
default virt-launcher-v151x-1-bqqr5 0/1 Init:0/1 0 2s

The status of the BIG-IP tenants on F5OS user CLI might show as "Started Tenant Instance" but the tenants will not be accessible.

Conditions:
One or more tenants are configured to utilize all available memory and the host undergoes a reboot.

Impact:
The BIG-IP tenants will not reachable.
No impact to BIG-IP's data.

Workaround:
With root access to the F5OS host, run the below command on bash shell:
# docker restart system_fpga

after few(~5) min the BIG-IP tenants will be reachable.

Fix:
A command should be executed on F5OS with root privileges to recover the tenants from inaccessible state.


2050869-2 : CVE-2022-41721 x/net/http2/h2c: request smuggling

Component: F5OS-A

Symptoms:
A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Conditions:
NA

Impact:
Potentially leading to the server misinterpreting request boundaries and processing unintended or malicious HTTP/2 requests.

Workaround:
NA

Fix:
Upgraded to golang.org/x/net v0.38.0


2050865-2 : CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache

Component: F5OS-A

Symptoms:
There's an uncontrolled resource consumption flaw in golang's net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http's http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.

Conditions:
NA

Impact:
Can trigger excessive resource and CPU consumption

Workaround:
NA

Fix:
Upgraded to golang.org/x/net v0.38.0


2050861-2 : CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment

Component: F5OS-A

Symptoms:
A flaw was found in golang. An attacker can craft an input to ParseFragment within parse.go that would cause it to enter an infinite loop and never return. The greatest threat to the system is of availability.

Conditions:
NA

Impact:
A specially crafted input may cause ParseFragment to enter an infinite loop, resulting in application hang and denial of service.

Workaround:
NA

Fix:
Upgraded to golang.org/x/net v0.38.0


2050853-2 : CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag

Component: F5OS-A

Symptoms:
A flaw was found in golang.org. In x/text, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.

Conditions:
An affected version of the golang.org/x/text library is present and the language.ParseAcceptLanguage function processes certain malformed BCP 47 language tags.

Impact:
May cause a "slice bounds out of range" panic

Workaround:
NA

Fix:
This issue is resolved by upgrading to golang.org/x/text v0.23.0.


2050845-2 : CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Component: F5OS-A

Symptoms:
A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.

Conditions:
NA

Impact:
May cause excessive CPU usage, leading to significant performance degradation

Workaround:
NA

Fix:
Upgraded to golang.org/x/text v0.23.0


2050841-2 : CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension

Component: F5OS-A

Symptoms:
A flaw was found in golang.org. In x/text, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.

Conditions:
NA

Impact:
May cause an "index out of range" panic

Workaround:
NA

Fix:
Upgraded to golang.org/x/text v0.23.0


2050833-2 : CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Component: F5OS-A

Symptoms:
A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows an attacker to cause applications using this package to parse untrusted input data to crash, leading to a denial of service of the affected component.

Conditions:
NA

Impact:
May trigger an out-of-bounds read and application panic, leading to a denial of service.

Workaround:
NA

Fix:
Upgraded to golang.org/x/text v0.23.0


2050801 : CVE-2017-16539 docker: The DefaultLinuxSpec function does not block /proc/scsi pathnames

Component: F5OS-A

Symptoms:
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.

Conditions:
The Docker engine version is earlier than 1.13.1 and
Docker containers are started with capabilities that allow write access to /proc/scsi/scsi.

Impact:
Containers with sufficient privileges could potentially remove SCSI devices from the host system, resulting in data loss or device unavailability.

Workaround:
NA

Fix:
This vulnerability is not present in Docker version v1.13.1 or later.


2050793 : CVE-2024-36623 moby: Race Condition in Moby's streamformatter Package

Component: F5OS-A

Symptoms:
A flaw was found in Moby's streamformatter package. This vulnerability allows data corruption or application crashes via multiple concurrent write operations triggered by a race condition

Conditions:
NA

Impact:
Users may experience data inconsistencies or unexpected termination of the application when concurrent write operations are invoked under specific runtime conditions.

Workaround:
NA

Fix:
This issue has been addressed with a fix


2050789 : CVE-2025-22868 golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

Component: F5OS-A

Symptoms:
A flaw was found in the golang.org/x/oauth2/jws package in the token parsing component. This vulnerability is made possible because of the use of strings.Split(token, ".") to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of . characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.

Conditions:
An affected version of the golang.org/x/oauth2/jws package is present and used to parse JWT tokens.

Impact:
Can lead to excessive memory consumption, potentially resulting in memory exhaustion and denial of service.

Workaround:
NA

Fix:
Upgraded to golang.org/x/oauth2 v0.28.0


2050701 : CVE-2025-58754 axios: Axios DoS via lack of data size check

Component: F5OS-A

Symptoms:
Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so when supplied a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.

Conditions:
Axios version prior to 0.30.2 and 1.12.0 is present and used in a Node.js environment to process URLs with the data: scheme.

Impact:
This will lead to DoS.

Workaround:
NA

Fix:
Axios has been updated


2047717-1 : PlatformStatsBridge process crash

Links to More Info: BT2047717

Component: F5OS-A

Symptoms:
The PlatformStatsBridge process crashes on SIGSEGV, creates a core file. The associated Docker container goes into "Exited" state.

SNMP failures and webUI errors occur, indicating the server or underlying service is unreachable.

Conditions:
Issue occurs occasionally, when an snmp request tries fetching diskUsagePercentage on platform stats.

Impact:
The Docker container does not restart automatically as expected.

Workaround:
None

Fix:
The support for diskUsagePercentage MIB has been reverted.


2044517-2 : Changing LDAP configuration via the GUI results in an unexpected error

Links to More Info: BT2044517

Component: F5OS-A

Symptoms:
Changing LDAP configuration on GUI errors out with the following error message - "object is not writable:
/oc-sys:system/oc-sys:aaa/oc-sys:authentication/f5-aaa-ldap:ldap/f5-aaa-ldap:state"

Conditions:
When using a Windows Active Directory (AD) server and LDAP settings are configured with Active Directory authentication enabled (true) and Unix Attributes disabled (false).

Impact:
You are unable to make LDAP configuration changes via the GUI.

Workaround:
Make the configuration change from CLI.

Fix:
GUI will not modify the read-only state part of the LDAP configuration and allow user to save the LDAP configuration changes.


2009765-1 : Tcpdump may crash with "malloc(): corrupted top size" when using complex BPF filters

Links to More Info: BT2009765

Component: F5OS-A

Symptoms:
Running tcpdump with complex or long BPF filter expressions may result in a crash with the error message:
malloc(): corrupted top size

Conditions:
This issue occurs when tcpdump is invoked with a filter expression containing multiple conditions or a long filter string, especially when run via the system diagnostics

Impact:
Packet capture operations fails and no data is collected. This may impact troubleshooting or monitoring activities that rely on tcpdump.

Workaround:
None

Fix:
Tcpdump has been updated to reliably support complex and long filter expressions. The utility now validates filter input to prevent errors, ensuring stable and consistent packet capture operations


2008753-2 : Privilege Escalation to Admin via SSH Port Forwarding

Links to More Info: K000156771


2008505-4 : F5OS SCP hardening

Links to More Info: K000156771, BT2008505


2000389-2 : CVE-2018-10105 - tcpdump: SMB data printing mishandled

Links to More Info: K000156675, BT2000389


1999777-2 : CVE-2018-10103 - tcpdump: SMB data printing mishandled

Links to More Info: K000156675, BT1999777


1998753-1 : CVE-2021-3516 libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c

Component: F5OS-A

Symptoms:
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

Conditions:
NA

Impact:
May trigger a use-after-free condition

Workaround:
Avoid processing untrusted or unknown XML files

Fix:
Applied upstream patches.


1998541-1 : CVE-2021-3518 libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c

Component: F5OS-A

Symptoms:
There's a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.

Conditions:
NA

Impact:
May trigger a use-after-free condition

Workaround:
Avoid processing untrusted or unknown XML files

Fix:
Applied upstream patches.


1998521-1 : CVE-2021-3517 libxml2: Out-of-Bounds Read in XML Entity Encoding Functionality

Links to More Info: K03179547, BT1998521


1998417-1 : CVE-2022-29824 libxml2: Integer Overflow in Buffer Handling Functions Leading to Out-of-Bounds Writes

Component: F5OS-A

Symptoms:
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

Conditions:
libxml2 before 2.9.14

Impact:
may trigger integer overflows in buffer handling functions, leading to out-of-bounds memory writes

Workaround:
Avoid processing untrusted or unusually large XML files

Fix:
Applied upstream patch


1998265-1 : CVE-2021-3537 libxml2: NULL Dereference Due to Improper Error Handling in Mixed Content Parsing Ask Explain

Component: F5OS-A

Symptoms:
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.

Conditions:
libxml2 versions before 2.9.11

Impact:
May trigger a NULL pointer dereference

Workaround:
Avoid processing untrusted or unknown XML documents in recovery mode

Fix:
Applied upstream patches.


1998233-1 : CVE-2017-9047 libxml2: Buffer Overflow in xmlSnprintfElementContent

Component: F5OS-A

Symptoms:
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.

Conditions:
An affected version of libxml2 (up to and including v2.9.4) is present and processes XML elements with complex content definitions using the xmlSnprintfElementContent function.

Impact:
A specially crafted XML file may trigger a buffer overflow

Workaround:
Avoid processing untrusted or specially crafted XML files

Fix:
Applied upstream patches.


1997969-1 : CVE-2017-16931 libxml2: Improper Handling of Parameter-Entity References

Component: F5OS-A

Symptoms:
parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.

Conditions:
libxml2 before 2.9.5

Impact:
May trigger improper handling of parameter-entity references, possibly leading to unexpected behavior

Workaround:
Avoid processing untrusted or unknown XML files

Fix:
Applied upstream patches.


1996657 : CVE-2022-2817 vim: heap use-after-free in string_quote() at src/strings.c

Component: F5OS-A

Symptoms:
A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.

Conditions:
vim prior to 9.0.0212

Impact:
May trigger a use-after-free condition

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1996609 : CVE-2022-3296 vim: out-of-bound write in function ml_append_int

Component: F5OS-A

Symptoms:
A stack-based buffer overflow vulnerability was found in vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.

Conditions:
NA

Impact:
Users may observe unexpected termination or memory inconsistency during editing or buffer operations.

Workaround:
NA

Fix:
This issue has been adressed with a fix


1996593 : CVE-2022-3234 vim: Heap-based Buffer Overflow

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.

Conditions:
NA

Impact:
The vim process may exit unexpectedly or produce inconsistent runtime behavior during editing.

Workaround:
NA

Fix:
The issue had been addressed with a fix


1996585 : CVE-2022-2816 vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c

Component: F5OS-A

Symptoms:
An out-of-bounds read vulnerability was found in Vim in the check_vim9_unlet function in the vim9cmds.c file. This issue occurs because of invalid memory access when compiling the unlet command when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the out-of-bounds read, causing the application to crash, possibly executing code and corrupting memory.

Conditions:
vim prior to 9.0.0211

Impact:
May trigger an out-of-bounds read

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1996529 : CVE-2022-2210 vim: out-of-bound write in function ml_append_int

Component: F5OS-A

Symptoms:
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.

Conditions:
vim prior to 8.2

Impact:
Could trigger an out-of-bounds write

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1996329 : CVE-2022-2580 vim: Out-of-bounds Read in vim

Component: F5OS-A

Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.

Conditions:
vim prior to 9.0.0102

Impact:
May trigger a heap buffer overflow

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is fixed in vim-minimal-2:9.1


1996193 : CVE-2022-2285 vim: integer overflow in del_typebuf() at getchar.c

Component: F5OS-A

Symptoms:
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.

Conditions:
vim prior to 9.0.

Impact:
May trigger an integer overflow or wraparound

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1995929 : CVE-2023-0433 vim: reading past the end of a line when formatting text

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.

Conditions:
NA

Impact:
Users may experience unexpected program termination or inconsistent runtime behavior when performing specific input processing or editing operations under certain conditions.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1995773 : CVE-2022-3256 vim: use-after-free in movemark() at mark.c

Component: F5OS-A

Symptoms:
A heap use-after-free vulnerability was found in vim's movemark() function of the src/mark.c file. This issue occurs because vim uses freed memory when 'autocmd' changes the mark. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.

Conditions:
NA

Impact:
Users may observe unexpected termination of the application, or internal memory inconsistencies, which under certain conditions could lead to unpredictable behavior beyond the editing session

Workaround:
NA

Fix:
The issue had been addressed with a fix


1995661 : CVE-2023-0512 vim: divide by zero in adjust_skipcol() at move.ca

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.

Conditions:
NA

Impact:
Users may encounter unexpected program termination when window width becomes very narrow under certain input conditions.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1995613 : CVE-2022-2207 vim: heap-based buffer overflow in function ins_bs

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

Conditions:
vim prior to 8.2.

Impact:
May result in a heap-based buffer overflow

Workaround:
Do not open untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1995465 : CVE-2022-2889 vim: use-after-free in find_var_also_in_script() in evalvars.c

Component: F5OS-A

Symptoms:
A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.

Conditions:
NA

Impact:
Users may observe unexpected termination of the process

Workaround:
NA

Fix:
The issue has been adressed by improving internal memory handling for specific input conditions


1995445 : CVE-2022-2287 vim: out of bounds read in suggest_trie_walk() at spellsuggest.c

Component: F5OS-A

Symptoms:
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.

Conditions:
vim prior to 9.0

Impact:
May trigger an out-of-bounds read

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1995353 : CVE-2022-2581: vim: Out-of-bounds Read in vim src/regexp.c

Component: F5OS-A

Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.

Conditions:
vim prior to 9.0.0104

Impact:
May trigger a heap buffer overflow

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1995349 : CVE-2022-2571 vim: Heap-based Buffer Overflow in vim

Component: F5OS-A

Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.

Conditions:
vim prior to 9.0.0101

Impact:
May trigger a heap buffer overflow

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1995341 : CVE-2022-3352 vim: use after free

Component: F5OS-A

Symptoms:
Use After Free in GitHub repository vim/vim prior to 9.0.0614.

Conditions:
NA

Impact:
Users may observe unexpected termination of vim or internal memory inconsistencies during buffer operations.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1995337 : CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension

Component: F5OS-A

Symptoms:
A flaw was found in golang.org. In x/text, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.

Conditions:
NA

Impact:
may cause a panic with "index out of range"

Workaround:
NA

Fix:
We are not using the package


1995157 : CVE-2022-2182 vim Heap-based Buffer Overflow

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

Conditions:
vim prior to 8.2.

Impact:
Could lead to a heap-based buffer overflow

Workaround:
Avoid opening files from untrusted sources

Fix:
This issue is addressed in vim-minimal-2:9.1


1995097 : CVE-2022-2125 vim Heap-based Buffer Overflow

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

Conditions:
A vulnerable version of vim (prior to 8.2)

Impact:
Could result in a heap-based buffer overflow

Workaround:
Avoid opening untrusted or unknown files with vulnerable versions of vim.

Fix:
The issue is resolved in vim-minimal-2:9.1


1995077 : CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

Component: F5OS-A

Symptoms:
A flaw was found where a maliciously crafted pf2 font could lead to an out-of-bounds write in grub2. A successful attack can lead to memory corruption and secure boot circumvention.

Conditions:
NA

Impact:
May trigger an out-of-bounds write

Workaround:
Avoid using untrusted or unknown pf2 font files

Fix:
Resolved by upgrading grub


1995037 : CVE-2022-3705 vim: a use after free in the function qf_update_buffernt

Component: F5OS-A

Symptoms:
A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.

Conditions:
NA

Impact:
Users may observe unexpected termination of vim or internal memory inconsistencies during quickfix buffer operations.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1994969 : CVE-2022-2946 vim-minimal-7.4.629-6.el7.x86_64.rpm: Use After Free in GitHub repository vim/vim prior to 9.0.0246

Component: F5OS-A

Symptoms:
A flaw was found in vim, where it is vulnerable to a use-after-free in the vim_vsnprintf_typval function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.

Conditions:
This issue can manifest when vim is used in workflows that handle dynamic input evaluation or formatted string operations.

Impact:
Users might see vim exit unexpectedly or behave inconsistently in those workflows.

Workaround:
NA

Fix:
The issue has been adressed


1994953 : CVE-2022-2284 vim: out of bounds read in utfc_ptr2len() at mbyte.c

Component: F5OS-A

Symptoms:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.

Conditions:
vim prior to 9.0.

Impact:
May trigger a heap-based buffer overflow

Workaround:
Do not open untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1994929 : CVE-2022-2819 vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c

Component: F5OS-A

Symptoms:
A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.

Conditions:
vim prior to 9.0.0210

Impact:
A specially crafted input file may trigger a heap buffer overflow.

Workaround:
Avoid opening untrusted or unknown files

Fix:
This issue is resolved in vim-minimal-2:9.1


1994669 : CVE-2023-0051 vim: heap-based buffer overflow in msg_puts_printf() in message.c

Component: F5OS-A

Symptoms:
A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.

Conditions:
NA

Impact:
Users may observe unexpected termination of vim or memory inconsistencies during message formatting operations.

Workaround:
https://access.redhat.com/security/cve/cve-2023-0051

Fix:
This issue has been addressed with a fix


1994593 : CVE-2020-14363 - libX11: Integer overflow leading to double-free in locale handling

Component: F5OS-A

Symptoms:
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.

Conditions:
The application must be compiled with libX11 using a vulnerable version (prior to 1.6.12)

Impact:
May result in a double-free condition, potentially causing the application to crash or, in some cases, leading to arbitrary code execution.

Workaround:
NA

Fix:
LibX11 has been removed, as it was unused


1994517 : CVE-2022-2126 vim: out of bounds read in suggest_trie_walk()

Component: F5OS-A

Symptoms:
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.

Conditions:
vim prior to 8.2

Impact:
Could lead to an out-of-bounds read

Workaround:
Do not open untrusted or unknown files

Fix:
This issue is fixed in vim-minimal-2:9.1


1994465 : CVE-2022-2862 vim: heap use-after-free in generate_PCALL() at src/vim9instr.c

Component: F5OS-A

Symptoms:
Use After Free in GitHub repository vim/vim prior to 9.0.0221.

Conditions:
vim prior to 9.0.0221.

Impact:
Successful exploitation may trigger a use-after-free condition

Workaround:
Do not open untrusted or unknown files

Fix:
This issue is addressed in vim-minimal-2:9.1


1994449 : CVE-2023-0054 vim-minimal-7.4.629-6.el7.x86_64.rpm: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.

Component: F5OS-A

Symptoms:
An out-of-bounds write flaw was found in Vim, in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to a missing check of the return value of the vim_regsub function when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file to trigger the out-of-bounds write, causing the application to crash.

Conditions:
NA

Impact:
Users may experience unexpected termination of vim or internal inconsistencies during substitution operations.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1988997-3 : Tenant experiences master key decrypt error after F5OS api-svc-gateway restart

Component: F5OS-A

Symptoms:
After the F5OS API service gateway (api-svc-gateway) restarts, tenants may experience SecureVault errors while attempting to decrypt the master key. The tenant will be inoperative.

Logs similar to the following will be present in F5OS:

api-svc-gateway[13]: nodename=blade-2(p3) priority="Err" version=1.0 msgid=0x5803000000000011 msg="Crypto key installation failed:" ERRNOSTR="Lost connection to ConfD" LASTERR="EOF on socket to ConfD" ERRNO=45
api-svc-gateway[13]: nodename=blade-2(p3) priority="Err" version=1.0 msgid=0x5804000000000027 msg="No unit key was found in confd for tenant" TENANT="tenant1"

Logs similar to the following in the tenant:
err mcpd[5803]: 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
notice mcpd[5803]: 01071029:5: Symmetric Unit Key decrypt
notice mcpd[5803]: 01071027:5: Master key OpenSSL error: 4007094004:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:664:

Conditions:
Issue is observed rarely when there is a recent restart (or power-cycle) of the system (specifically after a restart of the F5OS api-svc-gateway container).

Impact:
Unable to access tenants. Tenant restarts.

Workaround:
Restart the API service gateway and ensure it does not log errors while retrieving the tenant unit keys.
If the problem persists, restart the tenants.
If the problem continues to persist after number of tenant restarts, deploy new tenant and load UCS.


1976761-1 : System primary key is recreated when there is an error reading it from the hardware TPM

Links to More Info: BT1976761

Component: F5OS-A

Symptoms:
On F5OS appliances, if there is an error reading from the hardware TPM at some point, the system primary key is recreated but the ConfD database is not re-encrypted. When the system restarts at some point in the future, F5OS will be unable to decrypt the encrypted parts of the ConfD database, and will be unable to start up properly.

When the TPM read error happens, the following message is logged in the platform.log file:

"tpm has no data, writing new key"

However, the administrator will not notice a problem until the system is restarted. The restart could happen a significant time after the rewrite, and the above message may no longer be in the platform.log file.

After the restart, "Key header check failed" errors will be logged by the api-svc-gateway and orchestration-agent components. Note that these messages alone are not a definite indicator that the primary key was rewritten, as other issues can cause them to occur.

Conditions:
-- rSeries appliance
-- The system has been restarted after F5OS encounters an error when reading from the TPM.

Impact:
After the restart, the system is unusable and needs to be recreated.

Workaround:
None


1975309-1 : Logging from PAM modules only seen for SSH authentication, and not GUI/API authentication

Links to More Info: BT1975309

Component: F5OS-A

Symptoms:
Logging from PAM modules (e.g. pam_unix, pam_radius_auth, or pam_unix) is only captured in system logs when a user attempts to authenticate via SSH; no such logging occurs when authenticating via the F5OS GUI or API.

Conditions:
- F5OS system
- Attempting to troubleshoot issues related to authentication

Impact:
PAM module log messages are not logged anywhere.

The system does generate authentication success/failure messages that are captured in the audit.log, e.g.:

audit-service[12]: priority="Notice" version=1.0 msgid=0x1f03000000000012 msg="User authentication failed" reason="Invalid login attempt, user-id/password is incorrect" failcount=8 user="otters".

Workaround:
When troubleshooting authentication issues, attempt to log in via SSH. PAM modules will generate log messages that are captured in /var/log/secure and the systemd journal.


1975273-4 : RADIUS remote authentication specifying IPv6 server addresses does not work

Links to More Info: BT1975273

Component: F5OS-A

Symptoms:
F5OS does not send RADIUS Access-Request messages to a server specified as an IPv6 address. No messages are transmitted at all.

When attempting authentication against SSH, log messages similar to the following are in /var/log/secure:

sshd[30736]: pam_radius_auth: Failed looking up IP address for RADIUS server [2001:db8::1] (errcode=9)

Conditions:
F5OS remote authentication configured with a server defined by IPv6 address.

Impact:
F5OS remote authentication does not work.

Workaround:
Reference the RADIUS server by DNS hostname rather than IP address.

Important: The DNS hostname should only only resolve to IPv6 addresses, and not also be associated with an IPv4 address; for more information, refer to ID1975245: https://cdn.f5.com/product/bugtracker/ID1975245.html


1975245-1 : In IPv6-only environment, remote authentication using RADIUS server by hostname may not work

Links to More Info: BT1975245

Component: F5OS-A

Symptoms:
F5OS remote authentication does not work. Administrator can observe F5OS performing DNS resolution of the configured RADIUS server, but F5OS never transmits RADIUS Access-Request packets to the server.

Conditions:
- F5OS host is configured with only an IPv6 management IP address.
- RADIUS remote authentication configured with a RADIUS server specified via hostname.
- RADIUS server hostname has both IPv4 and IPv6 addresses (i.e. both A and AAAA records in DNS)

Impact:
Remote authentication does not work.

Workaround:
Create a separate hostname for the RADIUS server that only resolves to an IPv6 address.


1972357-3 : BIG-IP Tenant's VM will be patched/relaunched everytime after system reboot/upgrade/failover/TPOB restart

Links to More Info: BT1972357

Component: F5OS-A

Symptoms:
After upgrading from F5OS v1.6.1/1.7.0 to v1.8.x, tenant VMs were being unnecessarily patched and recreated, VM patches also not being properly applied.

Conditions:
- System upgraded from F5OS-C v1.6.1 or v1.7.0 to v1.8.x.
- System reboot, failover, or TPOB restart occurs.

Impact:
Tenant VMs were being unnecessarily patched and relaunched after every reboot.

Workaround:
None. Recommended to upgrade to F5OS-C v1.8.3 which includes this fix.

Fix:
These changes prevent unnecessary VM patching and recreation after system upgrades, reboots, or TPOB restarts while ensuring legitimate patches are properly applied.


1968289-3 : Confd.smp memory consumption spikes high with snmpEnableAuthenTraps enabled

Links to More Info: BT1968289

Component: F5OS-A

Symptoms:
When config-restore is performed on a RMA system, with the configuration of SNMPv3 users and targets and snmpEnableAuthenTraps enabled, observed confd.smp process memory spikes increase and causes OOM after system reboot.

Conditions:
Restoring the configuration onto an RMA replacement system.

Impact:
Confd's RSS memory begins to grow rapidly and causes restart of ConfD process.

Workaround:
The available workarounds,

1. After performing config-restore on a RMA system, disable snmpEnableAuthenTraps

2. Reset all SNMPv3 users and passwords right after performing config-restore.

Fix:
Disabling snmpEnableAuthenTraps when the engine-id of the database backup and the system engine-id. This will prevent confd.smp process memory hike in case of any sudden reboot of the system.

User can reconfigure the snmpEnableAuthenTraps after reseting the SNMPv3 users authentication and privacy password.


1962741-2 : CVE-2023-31436: kernel: out-of-bounds write in qfq_change_class function

Links to More Info: K000152785


1959845-4 : CVE-2022-48340: glusterfs: heap use-after-free in dht_setxattr_mds_cbk() in dht-common.c

Component: F5OS-A

Symptoms:
A flaw was found in Gluster, where GlusterFS is vulnerable to a denial of service caused by an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free. By sending a specially-crafted request, a remote attacker can cause a denial of service.

Conditions:
NA

Impact:
Clients may experience service interruption or unexpected termination of GlusterFS in certain operating scenarios.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1959817-1 : Qkview-collect crashes while collecting a QKView

Component: F5OS-A

Symptoms:
Qkview-collect may crash when collecting a QKView.

Conditions:
This happens intermittently when collecting a QKView.

Impact:
Unable to collect a QKView.

Workaround:
None


1953653-3 : cve-2022-27406: Freetype: Segmentation violation via FT_Request_Size

Links to More Info: K000141126, BT1953653


1934005-1 : Infrequent and uneven traffic to front panel LAGs can lead to premature aging of L2 events

Links to More Info: BT1934005

Component: F5OS-A

Symptoms:
For front panel LAGs on rSeries which span FPGAs (1.0/11.0, 2.0/12.0, etc) infrequent traffic which is not evenly distributed across the LAG members can lead to premature aging of L2 entries.

Conditions:
- r10000 or r12000-series appliance
- LAG members spanning FPGAs and minimal incoming traffic on the LAG can cause premature aging of L2 entries when the traffic isn't evenly distributed among LAG members.

Impact:
Missing L2 entries can cause excessive DLFs until the MAC address is re-learned.

Workaround:
Re-configure the LAG members such that they connect to the same FPGA (1.0/2.0, 11.0/12.0). Interfaces 1.0 through 10.0 are on one FPGA, and interfaces 11.0 through 20.0 are on the other FPGA.

Fix:
Ensure L2 age events are handled for all LAG members.


1933645-1 : GUI immediately logs user off with "User Session Terminated" error and "validator" process cores

Links to More Info: BT1933645

Component: F5OS-A

Symptoms:
After logging into the device, the GUI immediately reports "User Session Terminated. You will be logged out of the application."

Core files generated from the "validator" process in the confd container (system_manager, vcc-confd, or partition<X>_manager).

Conditions:
Trying to login to the GUI, and the "limited" group is missing from /etc/group.

The "limited" group is an internal role that should always be defined and cannot be deleted by a user. The most likely reason for it to be missing is https://cdn.f5.com/product/bugtracker/ID1858617.html

Impact:
Users are not able to access the GUI.

Workaround:
Apply a workaround for https://cdn.f5.com/product/bugtracker/ID1858617.html

Fix:
Even if the "limited" group goes missing, users should still be able to access the GUI.


1929309 : CVE-2019-14834-Dnsmasq vulnerability

Links to More Info: K000152048, BT1929309


1928829-3 : Egress traffic is being dropped by upstream switch following a reboot of rSeries.

Links to More Info: BT1928829

Component: F5OS-A

Symptoms:
Intermittently observed egress packets sent from the rSeries device through a specific port are discarded by the adjacent device.

Conditions:
- r5000, r10000, or r12000-series appliance
- Intermittently occurs when a link is brought up during boot, for instance after multiple reboot attempts.

Impact:
Traffic on the affected port is completely dropped when the system comes up after a reboot. This includes the failure of all Layer 2 (L2) protocols, such as LACP, STP, and LLDP, along with tenant traffic.

Workaround:
An additional reboot helps to recover the system.


1926585-1 : High memory utilization by NetworkManager

Links to More Info: BT1926585

Component: F5OS-A

Symptoms:
After a VELOS system controller, blade, or rSeries appliance has been running for several hundred days, the NetworkManager service may start leaking memory. This will eventually result in system instability including a failover between system controllers, or instability to tenants.

Log messages similar to the following occurring in /var/log/messages or the systemd journal:

controller-2.chassis.local NetworkManager[180091]: gsignal.c:2642: instance '0x564069a2be40' has no handler with id '34120'

Prior to these log messages being generated, there is no way to tell if the issue is close to occurring.

Conditions:
The NetworkManager service has been running for a substantial period of time (i.e. more than 500 days).

Impact:
NetworkManager service utilizes high memory in the system, which leads to controller failover.

Workaround:
Restart NetworkManager by logging in to the appropriate device as root (system controller, blade, or appliance) and running the command "systemctl restart NetworkManager".


1926489-1 : L2 Port motion events are not generated for certain port combinations on r10k.

Links to More Info: BT1926489

Component: F5OS-A

Symptoms:
Missing port-motion events between interfaces on r10k platform can result in missing L2 entries.

Conditions:
Port-motion between the following sets of ports on the r10k appliance:

1.0, 11.0, 12.0
2.0, 11.0, 12.0
11.0, 1.0, 2.0
12.0, 1.0, 2.0

3.0, 13.0, 17.0
7.0, 13.0, 17.0
13.0, 3.0, 7.0
17.0, 3.0, 7.0

4.0, 14.0, 18.0
8.0, 14.0, 18.0
14.0, 4.0, 8.0
18.0, 4.0, 8.0

5.0, 15.0, 19.0
9.0, 15.0, 19.0
15.0, 5.0, 9.0
19.0, 5.0, 9.0

6.0, 16.0, 20.0
10.0, 16.0, 20.0
16.0, 6.0, 10.0
20.0, 6.0, 10.0

Impact:
Missing port-motion causes missing L2 entries, resulting in excessive DLFs.

Workaround:
Ensure that ports used in redundancy configurations are not in the same set of affected ports listed above.

Fix:
Configure the L2 FDB table so port-motion is detected between the affected sets of ports.


1891301-3 : CVE 2020-27743: pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes().

Component: F5OS-A

Symptoms:
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

Conditions:
The current version pam_tacplus from version 1.6.0 doesn't have the fix as this was added in version 1.6.1 source package.

Impact:
This could lead to use of a non-random/predictable session_id which means an adversary could gain access.

Workaround:
N/A

Fix:
By updating the pam_tacplus source code to 1.7.0 where the vulnerability was fixed in 1.6.1, the new code does not have this issue.


1890297-2 : Memory leak in l2_agent daemon on F5OS

Links to More Info: BT1890297

Component: F5OS-A

Symptoms:
- Large memory consumption by the l2_agent.
- Tenant disruption on F5 rSeries appliance.

Conditions:
- An F5OS system with SNMP configured and a LAG (Link Aggregation Group) with more than 1 member.

- SNMP monitoring in use.

We can check the l2_agent memory consumption by using `top` command.

Ex: Top output showed a 15GB l2_agent process:

   PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
19454 root 20 0 17.3g 14.9g 1788 S 0.0 5.9 174:04.57 /confd/bin/l2_agent -s appliance-1

Impact:
Eventually the system experience OOM (Out of Memory).

On an F5 rSeries appliance, a tenant might experience disruptions and slowness, up to and including a TMM SIGABRT core.

Workaround:
None.

Fix:
The l2_agent process no longer leaks memory.


1858617-2 : Users unable to login after reboot with LDAP group configured

Links to More Info: BT1858617

Component: F5OS-A

Symptoms:
- CLI/GUI access for all roles other than admin and root is denied

- The GUI permit user authentication and then immediately terminate the session; for more information, refer to https://cdn.f5.com/product/bugtracker/ID1933645.html.

- Repeated log messages from user-manager in platform.log / velos.log with an error of "Lost connection to ConfD" / "Socket to ConfD is closed":

user-manager[17]: priority="Err" version=1.0 msgid=0x6802000000000001 msg="cdb_get failed for" ATTRIBUTE="rolename" ERRNOSTR="Lost connection to ConfD" LASTERR="Socket to ConfD is closed" ERRNO=45.

Conditions:
- LDAP system authentication is enabled
- A LDAP group is defined for a role in the system
- Queries to the LDAP server take a long time, for example due to connection timeouts or LDAP referral chasing.

This issue can also occur when the system is rebooted if user-manager tries to perform LDAP queries before the management network is accessible.

Impact:
Users with roles other than admin and root cannot login using CLI or GUI

Workaround:
1. Restart the appropriate user-manager container (system_user_manager on rSeries appliances, controller-userman for VELOS system controllers, and partition<ID>_user_manager for VELOS partitions)

2. Disable LDAP system authentication or remove the LDAP group definitions, and then restart the user-manager container. This will restore connectivity for locally-defined users.

Fix:
Fix users unable to login after reboot with LDAP group configured


1857245-1 : CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange

Component: F5OS-A

Symptoms:
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.

Conditions:
The SSH server implementation must support file transfer protocols over golang.org/x/crypto/ssh < 0.35.0

Impact:
DoS: the server’s memory or other resources may be exhausted, making it unavailable to legitimate users.

Workaround:
NA

Fix:
The vulnerability is fixed in golang.org/x/crypto/ssh v0.35.0 and above.


1857197-2 : CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange

Component: F5OS-A

Symptoms:
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.

Conditions:
The SSH server implementation must support file transfer protocols over golang.org/x/crypto/ssh < 0.35.0

Impact:
DoS: the server’s memory or other resources may be exhausted, making it unavailable to legitimate users.

Workaround:
NA

Fix:
The vulnerability is fixed in golang.org/x/crypto/ssh v0.35.0 and above.


1857077-1 : CVE-2025-22869 - SSH file-transfer servers vulnerable to Denial of Service via slow key exchange

Component: F5OS-A

Symptoms:
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.

Conditions:
The SSH server implementation must support file transfer protocols over golang.org/x/crypto/ssh < 0.35.0

Impact:
DoS: the server’s memory or other resources may be exhausted, making it unavailable to legitimate users.

Workaround:
NA

Fix:
The vulnerability is fixed in golang.org/x/crypto/ssh v0.35.0 and above.


1857001-1 : CVE-2025-27152: axios vulnerability

Component: F5OS-A

Symptoms:
When passing absolute URLs to axios, even if ⁠baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage.

Conditions:
When passing absolute URLs to axios.

Impact:
Affected code is in our product but cannot be exploited in any normal configuration

Workaround:
N/A

Fix:
Upgraded axios to a non-vulnerable version.


1824213-4 : CVE-2025-0395: glibc: buffer overflow in the GNU C Library's assert()

Links to More Info: K000151474


1814053-3 : Orchestration Agent process may core

Links to More Info: K000151718, BT1814053


1814045-3 : Daemons that handle ZMQ messages may crash under certain conditions.

Links to More Info: K000151718, BT1814045


1813929 : Insufficient memory on node, retrying tenant deployment

Links to More Info: BT1813929

Component: F5OS-A

Symptoms:
A tenant fails to deploy.

The output of the 'show tenant' command:
INSTANCE TENANT CREATION READY MGMT
NODE POD NAME ID SLOT PHASE TIME TIME STATUS MAC
------------------------------------------------------------------------------------------------------------------------------
1 tenant-1 1 1 Insufficient memory on node, retrying tenant deployment -


Errors in platform.log:
2024-12-21T16:19:02.370251+08:00 TENANT-1 orchestration-agent[7]: priority="Err" version=1.0 msgid=0x506000000000042 msg="Failed to allocate memory for tenant" TENANT="tenant-1" node=1.
2024-12-21T16:19:35.547187+08:00 TENANT-1 orchestration-agent[7]: priority="Err" version=1.0 msgid=0x507000000000004 msg="Unable to fetch VFs pci address from filesystem".
2024-12-21T16:19:40.757952+08:00 TENANT-1 orchestration-agent[7]: priority="Info" version=1.0 msgid=0x507000000000006 msg="SR-IOV DP pod is at running/ready state, able to access VFs".
2024-12-21T16:20:12.814467+08:00 TENANT-1 orchestration-agent[7]: priority="Err" version=1.0 msgid=0x506000000000040 msg="Timeout waiting for response from NodeAgent" TENANT="tenant-1" NODE=1.
2024-12-21T16:20:12.814506+08:00 TENANT-1 orchestration-agent[7]: priority="Err" version=1.0 msgid=0x506000000000042 msg="Failed to allocate memory for tenant" TENANT="tenant-1" node=1.

Conditions:
Exact conditions are unknown. It has been observed after upgrading from F5OS 1.5.2 to 1.8.0.

Impact:
Tenants will not start. The GUI reports "Insufficient memory on node, retrying tenant deployment".

Workaround:
None


1812541-1 : DDM system alarms triggered when interface is disabled

Links to More Info: K000150155, BT1812541

Component: F5OS-A

Symptoms:
Running 'show system alarms' reports "Portgroup <N> ERROR Lanes: 1 Transmitter power low alarm"

Conditions:
Disabling an interface locally

Impact:
Transmitter power low and transmitter bias low alarms occur.

Workaround:
To clear the alarms, workaround provided in article K000150155 can be followed.


1812497-4 : Restoring a backup with an SNMP user on a system with a different SNMP Engine ID will duplicate the SNMP user

Links to More Info: BT1812497

Component: F5OS-A

Symptoms:
If you restore a backup containing an SNMP user, but the SNMP user’s SNMP Engine ID does not match the current system, a new SNMP user will be created with the same name and the current system’s SNMP Engine ID. However, this is only seen when the database is later backed up.

Conditions:
-- Restoring a database backup that contains an SNMP user.
-- Doing the restore on a system with a different SNMP Engine ID.

Impact:
Two SNMP users with the same name (but different SNMP Engine IDs) are saved to subsequent backups. SNMP will not work.

Workaround:
Reconfigure the SNMP user authentication and privacy passwords after restoring the backup. SNMP will work after configuring passwords.

Fix:
When backup is restored on a system with a different EngineID, SNMP might not work for SNMP users. However, it can be mitigated by reconfiguring the SNMP user authentication and privacy passwords after restoring the backup.


1789141-3 : If 'ldap-group is configured for a role but LDAP search fails, users with the default GID for the role can still get those privileges

Component: F5OS-A

Symptoms:
When an 'ldap-group' mapping is configured for a F5OS role, and the mapping fails (because the filter is invalid or the LDAP query of remote groups fails for some other reason), the default mapping for the role (or, what is configured in 'remote-gid' for the role) is still used.

For example, if you were attempting to map the F5OS role 'admin' (default GID 9000) to an LDAP group 'CN=my-ldapgroup', and the LDAP search for that group failed (because the provided filter was invalid, the group does not exist, etc.), users with GID 9000 would still be able to authenticate and login with 'admin' privileges.

Conditions:
1. LDAP authentication is enabled.
2. A role mapping is applied via the 'ldap-group' configuration for a F5OS role.
3. The provided 'ldap-group' filter is invalid or another unexpected issue is encountered when querying the LDAP server.

Impact:
Users can login with privileges in excess of what one might expect given the system configuration.

Workaround:
If the LDAP group/users have Posix attributes ('gidNumber'), it is possible to map the F5OS role using this GID number by specifying it in the 'remote-gid' configuration under the role.

If this is not feasible, it is possible to directly validate the 'ldap-group' mapping was successful by inspecting this file from a bash shell:

[root@appliance-1(test):Active] ~ # cat /etc/ldap-gid-map.txt
1108:=9000

If there is an entry that has the default GID for the role on the right-hand side of ':=' in this file, it means the mapping was applied successfully and users with the default or 'remote-gid' GID will not be able to obtain the role permissions. If such an entry is missing, you will need to fix the 'ldap-group' filter so an LDAP query of the group can be successful.

Fix:
If a configured 'ldap-group' mapping fails, deny all role-based access for the mapped role until it is fixed or de-configured.


1789117-2 : SNMP bulk queries for LAGs on VELOS might return incomplete information

Links to More Info: BT1789117

Component: F5OS-A

Symptoms:
SNMP queries for interface statistics for a LAG might return incomplete information

Conditions:
- VELOS partition
- Querying SNMP for LAGs
- The LAG contains multiple members
- The SNMP client is issuing bulk SNMP queries
- The SNMP client queries for the first member of the LAG, skips another member of the LAG, and then queries information for the LAG

Impact:
The SNMP statistics reported by the VELOS system could possibly return incomplete information (failing to include statistics from one or more of the members of the LAG).

Workaround:
None

Fix:
The system will now correctly report SNMP statistics for LAGs.


1783685-1 : ATSE Datapath lockup on HBM calibration issue

Links to More Info: BT1783685

Component: F5OS-A

Symptoms:
Datapath lockup in the ATSE FPGA. Can be seen at startup with no traffic received at the host, or some time after startup with packet framing errors.

This can also show up as a transmit packet path lockup because health check loopback packets can back up into the transmit datapath and block it.

Conditions:
No known conditions.

Impact:
The impact is no packets can get from the network to host for processing.

Workaround:
The datapath lockup requires a reload of the ATSE FPGA. Reload typically done by rebooting the system.

This issue has been fixed in ATSE bitfiles v72.5.8.00 and v72.41.8.0 and all newer bitfiles.

Fix:
The issue is an FPGA memory reset procedure. The HBM memory inside the ATSE FPGA has a very specific bringup procedure. There was an issue with the initial implementation of that procedure.


1782925-4 : Active Directory LDAP integration without uidNumber/gidNumber does not work after system reboot

Links to More Info: BT1782925

Component: F5OS-A

Symptoms:
After an rSeries appliance reboot, Active Directory LDAP authentication configured with "Unix Attributes" set to false does not work and users from Active Directory are unable to authenticate with the F5OS system.

There will be messages similar to the following logged in platform.log shortly after the reboot:

authd[8]: priority="Err" version=1.0 msgid=0x3901000000000101 msg="LDAP API error during : -" oper="SASL bind" code=-1 msg="Can't contact LDAP server".
authd[8]: priority="Warn" version=1.0 msgid=0x3901000000000098 msg="Unable to retrieve domain Sid for supplied servers and domains; server will be treated as if it has unix attributes present.".

Conditions:
- F5OS device configured with Active Directory LDAP authentication, and the "Unix Attributes" setting configured as false.
- System reboots

Impact:
LDAP remote authentication does not work.

Workaround:
To workaround this issue on an rSeries appliance, create a cron task to restart the system_user_manager and authentication-mgr docker containers after a system reboot:

1. Log into the system as root and create /etc/cron.d/ldap-post-reboot with these contents (not including the '==='):
===
# Workaround for post-reboot issue with LDAP auth (ID1782925)
#
# In the the first five minutes after the system reboots, assume the first
# instance of the following log message that we see is a result of the management
# port lack of connectivity when the docker containers start up, and restart both
# system_user_manager and authentication-mgr once.
#
# authd[8]: priority="Err" version=1.0 msgid=0x3901000000000101 msg="LDAP API error during : -" oper="SASL bind" code=-1 msg="Can't contact LDAP server".

@reboot root timeout 5m sh -c 'tail -n0 -F /var/F5/system/log/platform.log | grep -a -m1 authd.*0x3901000000000101 && sleep 20s && echo Restarting authd and user-manager && docker restart system_user_manager authentication-mgr' || echo "Timed out"
===

This mitigation may fail under some corner cases, e.g. potentially after an upgrade or if something goes wrong with the platform services such that they don't start up within the first five minutes after system boot. In those circumstances, log into the system as root and restart the system_user_manager and authentication-mgr containers:

    docker restart system_user_manager authentication-mgr


1782497-2 : CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder

Component: F5OS-A

Symptoms:
A malicious HTTP/2 stream can cause excessive CPU usage on the server, due to expensive HPACK decoding operations.

Conditions:
Golang < 1.19.6

Impact:
Denial of Service, availability is affected

Workaround:
NA

Fix:
The vulnerability is fixed in golang 1.20.0 and above.


1780721-1 : CVE-2022-41723 - specially crafted HTTP/2 stream could cause excessive CPU usage in the HPACK decoder

Component: F5OS-A

Symptoms:
A malicious HTTP/2 stream can cause excessive CPU usage on the server, due to expensive HPACK decoding operations.

Conditions:
Golang < 1.19.6

Impact:
Denial of Service, availability is affected

Workaround:
NA

Fix:
The vulnerability is fixed in golang 1.20.0 and above.


1780617-1 : CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames

Links to More Info: K000148640


1779677-3 : Multiple docker containers can get assigned the same bridge IP during rolling upgrade

Links to More Info: BT1779677

Component: F5OS-A

Symptoms:
Multiple containers can get the same bridge IP during a rolling upgrade or docker restart

[root@controller-2 ~]# docker inspect controller-services-registry-2502 | grep IPAddress
            "SecondaryIPAddresses": null,
            "IPAddress": "100.64.0.2",
                    "IPAddress": "100.64.0.2",
[root@controller-2 ~]# docker inspect partition-services-registry-2202 | grep IPAddress
            "SecondaryIPAddresses": null,
            "IPAddress": "100.64.0.2",
                    "IPAddress": "100.64.0.2",

There's a race in IP address allocation in Docker.

Conditions:
When multiple containers start at the same time.

Impact:
This causes one of the two containers to answer requests depending on which container last refreshed the arp cache.
The other container does not work properly.

Workaround:
Reboot the system.

Fix:
Docker address allocator uses bit map to manage IP address pool but it's not thread safe.

Now, set/unset bitmap operations are protected by a lock.


1779289-6 : Error when creating a server-group name with an embedded space

Links to More Info: BT1779289

Component: F5OS-A

Symptoms:
An error log inside 'platform.log' for the rSeries systems or 'velos.log' in the VELOS systems when you configure a server-group name with an embedded space.

In velos.log on F5OS-C or platform.log on F5OS-A:

appliance-1 authd[8]: priority="Err" version=1.0 msgid=0x3901000000000109 msg="Failed to set element in cdb." path="/system/aaa/server-groups/server-group" error="Bad key "my server group" (wrong number of identifiers) at: /system/aaa/server-groups/server-group" errno="Exec format error".

Conditions:
Creating a server-group name with an embedded space.
Example: my server group

Impact:
The configuration change will not take an effect.

Workaround:
Remove all spaces from the server-group name. For example, if the server-group name with a space was 'my server group', you can rename it into 'my_server_group' and re-configure the rest of the values.


appliance-1(config)# system aaa server-groups server-group my_server_group config name my_server_group

appliance-1(config)#commit

Fix:
Avoid embedded spaces when you create server-group names.


1757617-1 : XBAR rate limit not updated when modifying LAG

Links to More Info: BT1757617

Component: F5OS-A

Symptoms:
Traffic performance may be degraded.

Conditions:
Add or remove a LAG member when the total speed is less than 100G.

Impact:
Degraded performance.

Workaround:
Disable and re-enable an interface.


1757461-1 : ConfD encryption key is recreated when there is an error reading it from the hardware TPM

Links to More Info: BT1757461

Component: F5OS-A

Symptoms:
F5OS stores the encryption key in the hardware TPM module. This is used to encrypt and decrypt sensitive data in the database, and is read at system startup and periodically during normal execution (during "key migrations"). If there is an issue reading the key from the TPM, a new key will be generated and store it in the TPM.

The problem is that the database is still encrypted using the old key, and as soon as the system restarts it will run into errors when attempting to decrypt using the new key.

Conditions:
Issue is observed intermittently when TPM module encounters ownership contention.

Impact:
System encryption key gets corrupted.

Workaround:
None

Fix:
The symptom causing the tpm ownership has been fixed and removed unnecessary ownership calls.


1754097-1 : rSeries ATSE v72.41.6.00 firmware

Links to More Info: BT1754097

Component: F5OS-A

Symptoms:
rSeries ATSE v72.41.6.00 firmware

Conditions:
rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
None

Workaround:
None

Fix:
Fixes ATSE receive lockup issue.


1753469-3 : Add notification to set-version when downgrading the system from F5OS-A/C-1.8.0

Links to More Info: BT1753469

Component: F5OS-A

Symptoms:
A downgrade to an earlier version of F5OS from F5OS-A/C 1.8.0 can leave the system inoperable. Refer to ID1712009 for more information.

Conditions:
Perform a config-restore or config reset-to-default operation to an earlier version of F5OS.

Impact:
A downgraded system may be inoperable.

Workaround:
Refer to ID1712009 for workaround.

Fix:
There is an issue with performing a config-restore after downgrading from F5OS-A/C 1.8.0 (ID1712009). If you intend to perform a config-restore or config reset-to-default operation, please refer to the F5OS-A/C 1.8.0 release notes for information on avoiding this issue.


1730833-1 : Tmm may egress broadcast traffic even when VLANs are disabled in F5OS

Links to More Info: BT1730833

Component: F5OS-A

Symptoms:
In certain scenarios such as restoring a UCS on an F5OS tenant, if the VLANs in F5OS are disabled, tmm may egress broadcast traffic such as gratuitous ARPs onto the disabled VLANs.

Conditions:
-- An F5OS tenant where VLANs were assigned and then removed.
-- An F5OS tenant where tmm is not in forced-offline mode.
-- An action occurs on the tenant (such as restoring a UCS or restarting tmm, or loading the config) that results in gratuitous ARPs.

Impact:
This could cause IP address conflicts on the network or other issues related to unexpected broadcast traffic such as gratuitous ARPs on the network.

Workaround:
- In F5OS, remove the affected VLANs from the LAG or interface.

- On the tenant use forced offline to prevent traffic egress.

- If you are restoring a UCS from another BIG-IP such as for a platform migration, put the source BIG-IP into forcedoffline state before taking the UCS.

- delete the tenant, and recreate without any VLANs assigned.

Fix:
A single tenant with a vlan that was configured and then removed via F5OS will no longer leak broadcast traffic onto the network on the removed vlan.

This fix does not address the issue when multiple tenants are attached to the same vlan. F5 has created ID1758957 for that issue.


1713485-1 : RSeries ATSE v72.5.6.00 firmware

Links to More Info: BT1713485

Component: F5OS-A

Symptoms:
RSeries ATSE v72.5.6.00 firmware

Conditions:
RSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
NA

Workaround:
None

Fix:
Fixes ATSE receive lockup issue.


1713073-4 : F5OS rSeries spontaneous reboot after upgrade

Links to More Info: K000148566, BT1713073

Component: F5OS-A

Symptoms:
After upgrading, the device reboots unexpectedly.

Pel logs have this signature:
11/05/2024 21:24:47 | 5753 | AOM | 255 | Network Access | 0 | CPU internal error event
11/05/2024 21:24:47 | 5754 | AOM | 255 | Network Access | 5 | ME PECI is not functional, resetting host
11/05/2024 21:24:47 | 5755 | AOM | 255 | Network Access | 5 | ... reason: 0xFF ME IPMI 'other error'
11/05/2024 21:24:47 | 5756 | AOM | 255 | Network Access | 6 | lop host reset event

Conditions:
-- rSeries 5xxx, 10xxx, 12xxx system
-- Upgrade to version 1.8.0 build 16036

Impact:
Spontaneous system restart could occur.

Workaround:
A BIOS change occurred in the F5OS 1.8.0 build 16036 upgrade that enables CMS ENABLE DRAM PM. Disabling it will mitigate this.

For instructions on how to perform this procedure, see K000148566: F5 rSeries systems may silently reboot after upgrading to F5OS-A 1.8.0 at https://my.f5.com/manage/s/article/K000148566.

Fix:
Fixes introduced in F5OS-A-1.8.0-17564.R5R10.EHF-1.iso


1709121-3 : Unable to create a tenant as the Network Manager start-up or failover may result in a looping process

Links to More Info: BT1709121

Component: F5OS-A

Symptoms:
While creating a new tenant, an error occurs:

"Failure for data/f5-tenants:tenants API. The server or an underlying service is unreachable."

The network-manager service seems to hang, or it might be in a restart loop.

In confd, the 'show system mac-allocation state' command indicates that no MAC addresses have been allocated.

$ show system mac-allocation state
system mac-allocation state free-single-macs 16
system mac-allocation state allocated-single-macs 0
system mac-allocation state free-large-blocks 2
system mac-allocation state allocated-large-blocks 0
system mac-allocation state free-medium-blocks 0
system mac-allocation state allocated-medium-blocks 0
system mac-allocation state free-small-blocks 0
system mac-allocation state allocated-small-blocks 0
system mac-allocation state total-free-mac-count 80
system mac-allocation state total-allocated-mac-count 0 <---
system mac-allocation state total-mac-count 80

Conditions:
This can occur with combinations of tenants using MAC blocks greater the size 1. The specific combinations are somewhat unpredictable.

Impact:
Tenants cannot be created.

Workaround:
None

Fix:
The code will be updated to prevent the hang condition.


1697237-2 : Partition volumes IMAGES, shared are not present in partition snmpwalk output. in hrStorageDescr in HOST-RESOURCES-MIB

Links to More Info: BT1697237

Component: F5OS-A

Symptoms:
SNMP get fails to display the HOST-RESOURCES-MIB details for the partition's volumes IMAGES.

Conditions:
Snmpwalk is performed on the Chassis Partition.

Impact:
HOST-RESOURCES-MIB information is not included in snmp get output.

Workaround:
None

Fix:
Corrected the regex used to collect the Partition's volumes image details.


1697197-1 : Memory leak in tcpdumpd_manager, when doing tenant's VLAN configuration change

Component: F5OS-A

Symptoms:
Observe memory leak in the tcpdumpd_manager, when doing tenant's VLAN configuration changes.

Conditions:
When Tcpdumpd_manager docker container is running, performing any kind of tenant's VLAN configuration changes will cause memory leak.

Impact:
Memory leak.

Workaround:
None.


1695549-2 : CVE-2024-23599: Race condition in Seamless Firmware Updates

Links to More Info: K000141500


1694481-3 : K3s token expiry causing tenant unresponsiveness

Links to More Info: BT1694481

Component: F5OS-A

Symptoms:
Expiry of service account token inside multus pod causes tenant startup to fail.

Tenant fails to deploy and the tenant status ('show tenants') reads:

Not ready: containers with unready status: [compute]

There are numerous entries similar to the following in /var/log/messages:

"Unable to authenticate the request" err="[invalid bearer token, Token has expired.]"

Note: Tenant will only be impacted if/after it is changed to configured or provisioned and then it is deployed again.

Conditions:
-- Multus.kubeconfig is not recreated or updated when the service account token in /var/run/secrets/kubernetes.io/serviceaccount/token is renewed.
-- Even though the token is renewed, the token is still valid for a year in multus.kubeconfig

Impact:
After one year, token in the multus.kubeconfig becomes stale (expired). As a result, when Multus tries to access the Kubernetes API server using the stale token in the multus.kubeconfig, it may fail with authentication errors because the token is no longer valid.

Workaround:
Workaround(1):
Impact of procedure: Performing the following procedure should not have a negative impact on your system.

Delete the multus pod by logging into the system as root and running the following command:

kubectl -n kube-system delete pod -l app=multus

The system will delete the running pod and create a new one. This will refresh the token for the next one year.

Workaround(2):
Impact of procedure: Tenants will be temporarily unavailable during this process.

Rebooting the device will refresh the token.

Fix:
None


1692837 : CVE-2024-21781: Intel BIOS vulnerability

Links to More Info: K000141509


1691557-5 : CVE-2020-8037: tcpdump memory leak.

Links to More Info: K000149929


1679941-4 : "gen error" while running snmpget/snmpbulkget commands

Links to More Info: BT1679941

Component: F5OS-A

Symptoms:
Triggered shell script which does the snmpget/snmpbulkget in a loop with 50sec delay in each loop reports genError for hrStorageAllocationunits

Conditions:
Snmpwalk is fetching the value for any index. No validation for the key passed.

Impact:
Some OIDs report an error, for example

Error in packet
Reason: (genError) A general failure occured
Failed object: HOST-RESOURCES-MIB::hrStorageAllocationUnits.131080

Workaround:
None

Fix:
Need to validate the index/key


1677249-5 : CVE-2024-6232: python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

Links to More Info: K000148252


1673925-2 : Missing masquerade MAC FDB entry causes excessive DLFs following tenant failover.

Links to More Info: BT1673925

Component: F5OS-A

Symptoms:
The FDB entry for the tenants masquerade MAC is missing from a blades internal L2 table after a tenant failover.

The output of

[root@blade-1 ~]# docker exec -i partition_fpga tmctl -d blade -w 180 nse_l2 -s mac,l2_tag
mac l2_tag
--- ------

[root@blade-1 ~]

where MAC and L2_tag match the masquerade MAC and VLAN from the output of 'show FDB'

Conditions:
During tenant failover, the system will delete the masquerade MAC from the old active and add it to the new active. In parallel, the system will detect a port-motion event when the tenant issues a GARP for the new MAC.

This introduces a race condition between the static ADD from the system and the dynamic port-motion event from the H/W. If the port-motion event is processed last, the new static entry can be deleted erroneously.

Impact:
All front-panel traffic towards the tenant will encounter a DLF, causing excessive DLF traffic to the tenant.

Workaround:
From the tenant, remove and then re-add the masquerade MAC to the traffic group.

Fix:
For port-motion events, don't delete the existing entry if it's a static system entry.


1673265-5 : RADIUS remote auth on F5OS may not use system management IP as NAS IP address

Links to More Info: BT1673265

Component: F5OS-A

Symptoms:
An F5OS appliance does not use the management IP as the NAS-IP-Address or NAS-IPv6-Address in RADIUS authentication messages, or uses a stale/out-of-date management IP address.

Conditions:
- An F5OS system configured for RADIUS remote authentication
- The F5OS host is configured to use DHCP for assignment of its management IP, or an administrator changes the management IP addresses without rebooting the system.

Impact:
RADIUS messages sent to servers contain an incorrect NAS IP address.

Workaround:
None

Fix:
F5OS will now use the correct management IP address for the NAS-IP-Address / NAS-IPv6-Address attribute.


1671629-2 : [rSeries r2000/r4000] After F5OS reboot, tenant interfaces might be in UNINITIALIZED state

Links to More Info: BT1671629

Component: F5OS-A

Symptoms:
- After F5OS reboot, tenant interfaces might be in UNINITIALIZED state.
- Logs from tenant (/var/log/ltm) will show platform_agent receiving blank VLAN names. Example below where vlan id is 1234 (correct) but vlan name is blank (incorrect):

info platform_agent[7810]: 01e10007:6: vlan id = 1234vlan name = interface name = 1.3

Conditions:
- Rebooting F5OS
- rSeries r2000/r4000

Impact:
Traffic disruption. Since tenants interfaces will be UNINITIALIZED, the tenant will not be passing traffic.

Workaround:
- Remove all the VLANs from the interface (where VLAN names are missing) and re-attach the VLANs. This is to be done from F5OS side.
- Rebooting again is also known to resolve the problem (as this is a timing issue on reboot and does not happen frequently)


1671517 : WebUI Dashboard Memory & Storage Statistics are inaccurate and misleading

Links to More Info: BT1671517

Component: F5OS-A

Symptoms:
The webUI Dashboard for rSeries and VELOS devices provides inaccurate details about memory and storage utilization for the device.

Conditions:
Any device that is running a F5OS-A or F5OS-C version older than v1.8.0.

Impact:
Graphical representation on the webUI Dashboard for memory and storage utilization for the device is inaccurate.

Workaround:
Upgrading a device to F5OS v1.8 or greater resolves the issues.

Fix:
ID1233865 and ID1211233-4 both address the underlying issues of inaccurate storage and memory utilization reporting for the platforms. They have both been fixed for F5OS v1.8.0 in addition to ID1671517 that corresponds to the associated webUI changes and improvements.


1671133-3 : kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies

Component: F5OS-A

Symptoms:
Use of Insufficiently Random Values

Conditions:
if icmp redirection are enabled.

Impact:
This flaw allows an off-path remote user to effectively bypassing source port UDP randomization.

Workaround:
Fixed in 1.8.4

Fix:
Fixed in 1.8.4


1660961-5 : Active Directory LDAP integration without uidNumber/gidNumber does not work with LDAP over TLS

Links to More Info: BT1660961

Component: F5OS-A

Symptoms:
Configuring an F5OS device to integrate with Active Directory using group names to map to roles rather than requiring unix attributes (uidNumber/gidNumber) in the directory will not work if the LDAP servers are configured to use encryption (TLS/SSL).

Log messages similar to the following in platform.log / velos.log:

authd[8]: priority="Err" version=1.0 msgid=0x3901000000000101 msg="LDAP API error during : -" oper="bind" code=-1 msg="Can't contact LDAP server".
authd[8]: priority="Warn" version=1.0 msgid=0x3901000000000098 msg="Unable to retrieve domain Sid for supplied servers and domains; server will be treated as if it has unix attributes present.".

Conditions:
- LDAP system authentication configured to authenticate against an Active Directory Server
- Under the system Authentication Settings configuration in the Common LDAP Configuration section, "Authenticate with Active Directory" set to True and "Unix Attributes" set to False
- LDAP group filters specified for one or more roles

Impact:
LDAP authentication functions based on unix attributes in the directory (uidNumber/gidNumber)

Workaround:
None


1644293-6 : Interface status alert and SNMP trap is not sent immediately after interface is disabled

Links to More Info: BT1644293

Component: F5OS-A

Symptoms:
When an interface is disabled, the alert or SNMP trap is not sent immediately.

Conditions:
-- Disable an interface.
-- R5000, R10000 and R12000 platforms
-- VELOS platform

Impact:
No alert or SNMP trap is sent when an interface is disabled. The trap is sent when the interface is re-enabled.

Workaround:
None

Fix:
Add a new "Interface disabled" event triggered when an interface is disabled. The "Interface up" and "Interface down" alerts changed to events.

Note : F5OS-A v1.8.3 is not affected by this bug.


1644221-1 : Log file grows to gigabytes (GBs) under /var/log

Links to More Info: BT1644221

Component: F5OS-A

Symptoms:
The default setting for logrotation on host-os is once per day. This can be troublesome if a problem arises and causes an excessive amount of log files to be generated. In such cases, the log files will grow to several GBs within a day.

Conditions:
If any service floods the logfiles under /var/log then file starts to grow in GBs.

Impact:
System disk gets full and becomes unusable.

Workaround:
None

Fix:
This issue has been fixed and the Log files will no longer grow in GBs.


1637529 : RSeries ATSE v72.41.5.00 firmware

Links to More Info: BT1637529

Component: F5OS-A

Symptoms:
RSeries ATSE v72.41.5.00 firmware

Conditions:
RSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes ATSE/BE2 interface stability issues. See ID1596625 for more information.


1637525 : RSeries ATSE v72.5.5.00 firmware

Links to More Info: BT1637525

Component: F5OS-A

Symptoms:
RSeries ATSE v72.5.5.00 firmware

Conditions:
RSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes ATSE/BE2 interface stability issues. See ID1596625 for more information.


1636261-3 : F5OS only supports configuration of 'ssh-rsa' SSH host key algorithm

Links to More Info: BT1636261

Component: F5OS-A

Symptoms:
For systems that are not licensed for FIPS 140-3, F5OS permits configuration of various cryptographic parameters for the SSH system service.

The administrator can configure the list of advertised ciphers and MACs and key exchange algorithms, but for the host key algorithm, the only thing that an administrator can configure is whether or not the system supports the 'ssh-rsa' host key algorithm; other algorithms are always enabled.

For systems not licensed for FIPS 140-3, the other host key algorithms that are always enabled are ecdsa-sha2-nistp256-cert-v01@openssh.com, ecdsa-sha2-nistp256, ssh-ed25519, rsa-sha2-512, and rsa-sha2-256.

Attempting to explicitly configure any algorithm other than "ssh-rsa" will fail with an error:

rseries(config-service-sshd)# system security services service sshd config host-key-algorithms [ ecdsa-sha2-nistp256-cert-v01@openssh.com ecdsa-sha2-nistp384-cert-v01@openssh.com ]
rseries(config-service-sshd)# commit
Aborted: 'system security services service sshd': ecdsa-sha2-nistp384-cert-v01@openssh.com Is not part of allowed HostKeyAlgorithms list

Conditions:
An F5OS system that is NOT licensed for FIPS 140-3.

The 'ssh-rsa' algorithm is disabled by default, but can be enabled by adding it to the configuration for SSH's advertised Host Key Algorithms:

rseries(config)# system security services service sshd config host-key-algorithms [ ssh-rsa ]

Impact:
Attempting to configure host key algorithms for the system SSH daemon other than 'ssh-rsa' fails with an error:

Aborted: 'system security services service sshd': ecdsa-sha2-nistp384-cert-v01@openssh.com Is not part of allowed HostKeyAlgorithms list

Workaround:
None


1635729-1 : Restrict Multiple STP protocol selection

Links to More Info: BT1635729

Component: F5OS-A

Symptoms:
The stp global config command allows you to configure multiple STP modes, but this should not be allowed.

In platform.log you see fpgamgr[15]: priority="Err" version=1.0 msgid=0x302000000000011 msg="Unexpected STP configuration." DESCRIPTION="Multiple protocols enabled. Selecting NONE".

Conditions:
More than one protocol is configured at once, for example:
stp global config enabled-protocol [ STP RSTP MSTP ]

Impact:
Can lead to upgrade failures. Configuration data displayed is not consistent.

Workaround:
Make sure only one protocol is configured at a given time.


1630273-5 : CVE-2023-4207 - Centos Security Update for kernel

Links to More Info: K000138693


1630253-5 : CVE-2023-4208 - Centos Security Update for kernel

Links to More Info: K000138693


1630009-2 : F5 rSeries NSO firmware v70.5.2.22

Links to More Info: BT1630009

Component: F5OS-A

Symptoms:
F5 rSeries NSO firmware v70.5.2.22

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1630005-2 : F5 rSeries NSO firmware v70.5.2.11

Links to More Info: BT1630005

Component: F5OS-A

Symptoms:
F5 rSeries NSO firmware v70.5.2.11

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1630001-2 : F5 rSeries NSO firmware v70.5.2.00

Links to More Info: BT1630001

Component: F5OS-A

Symptoms:
F5 rSeries NSO firmware v70.5.2.00

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1629993-2 : F5 rSeries ASW firmware v71.5.2.22

Links to More Info: BT1629993

Component: F5OS-A

Symptoms:
F5 rSeries ASW firmware v71.5.2.22

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1629985-2 : F5 rSeries ASW firmware v71.5.2.11

Links to More Info: BT1629985

Component: F5OS-A

Symptoms:
F5 rSeries ASW firmware v71.5.2.11

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1629977-2 : F5 rSeries ASW firmware v71.5.2.00

Links to More Info: BT1629977

Component: F5OS-A

Symptoms:
F5 rSeries ASW firmware v71.5.2.00

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
None

Fix:
Fixes port mode mismatch. See ID1576345 for more information.


1628557-6 : F5OS high memory usage when using snmp

Links to More Info: K000149820, BT1628557


1624777-4 : Tenants will not deploy since Orchestration Agent process is continuously generating a core

Links to More Info: BT1624777

Component: F5OS-A

Symptoms:
When attempting to deploy a tenant an error occurs:

tenants tenant my-bigip-1 config type BIG-IP (fill out all prompts)
default-1(config-tenant-my-bigip-1)# commit
Aborted: application communication failure

Core files are found in the partition's /shared/core/container/ directory.

Conditions:
-- Creating a BIG-IP tenant
-- Orchestration agent is crashing

Impact:
Tenants cannot be deployed if Orchestration Agent is crashing. User will not be able to deploy a tenant successfully.

Workaround:
None


1623613-1 : F5OS:Change of OIDs type from Counter64 to Gauge32 for system memory

Links to More Info: BT1623613

Component: F5OS-A

Symptoms:
System memory related SNMP attributes like available, free and platformUsed were defined as Counter64 in F5-PLATFORM-STATS-MIB.mib

Conditions:
Always.

Impact:
No functional impact. The System memory OIDs display as Counter64.

Workaround:
No

Fix:
Updated Counter64 to Gauge32


1620921-2 : During live-upgrade, "show cluster cluster-status" shows "K3s IMAGE update has failed, will retry"

Links to More Info: BT1620921

Component: F5OS-A

Symptoms:
If the prompt status is stuck in either of these 2 stages after F5OS-A live upgrade:
'Cluster update in-progress/Waiting for cluster service',

checkout the cluster state by running following command:
'show cluster cluster-status'

If the cluster state shows some output like this where K3s Image update has failed, and confirm that this same issue is hit.

INDEX STATUS
---------------------------------------------------------------------------------------------------
... . . . ...
6 2024-07-25 15:51:23.567837+00:00 - K3s IMAGE update has failed, will retry.
... . . . ...

Conditions:
This can occur while performing a live upgrade of F5OS-A.

Impact:
The prompt status is stuck in 'Cluster update in-progress/Waiting for cluster service' error.

Workaround:
Reboot the system. The upgrade will resume and complete.


1620513 : CVE-2024-38477 httpd: NULL pointer dereference in mod_proxy

Links to More Info: K000140784, BT1620513


1620077-6 : FDB entry port motion not working if new interface is a trunk/LAG

Links to More Info: BT1620077

Component: F5OS-A

Symptoms:
Immediately after a fail-over of traffic from one trunk/LAG to another, outbound traffic from the appliance or chassis to certain addresses may be interrupted for up to five minutes before recovering.

Conditions:
Switching traffic from one LAG to another on an appliance or chassis.

Impact:
Temporary disruption of tenant’s outbound traffic on an appliance or chassis system.

Workaround:
None

Fix:
Updated handling of FDB entry port motion to include cases with a trunk/LAG as the new interface.


1617125 : Production license manual activation failed on F5OS-A 1.7.0

Links to More Info: BT1617125

Component: F5OS-A

Symptoms:
A new EVAL/PROD license manual activation attempt will fail in F5OS-A 1.7.0. This issue only applies to F5OS-A 1.7.0.

Conditions:
The manual license activation with a new EVAL/PROD license key.

Impact:
License activation using manual install process will not work.

Workaround:
None

Fix:
Fixed the dossier locking fields used in EVAL/PROD license keys in F5 License server. There is no software changes associated to this fix.

This issue was fixed in F5 License server in F5OS-A 1.7.0 and is not applicable to F5OS-A 1.8.0.


1614821-5 : CVE-2024-3596 - Blast-RADIUS

Links to More Info: K000141008, BT1614821


1614429 : iHealth upload is failing with error "certificate signed by unknown authority"

Links to More Info: K000140362, BT1614429

Component: F5OS-A

Symptoms:
When attempting to use the QKView upload feature, the upload may fail with the message "certificate signed by unknown authority". This is due to a recent change in certificate authority that is inconsistent between F5OS and iHealth.

Conditions:
Always, after mid-July 2024.

Impact:
Unable to upload QKView files to iHealth with a single click.

Workaround:
You can use the File Export feature to download QKView files, and then upload these files to iHealth.

You can find the QKView files in the GUI at System Settings > File Utilities, then choose "diags/shared" as the base directory, then select "qkview".

Fix:
Certificate authorities used by the iHealth upload feature in F5OS will be updated.


1612405-1 : LACP status shows UP in BIG-IP tenant even if its down on F5OS.

Links to More Info: BT1612405

Component: F5OS-A

Symptoms:
LACP Trunk is UP in BIG-IP tenant even when it’s DOWN on F5OS.

Conditions:
Condition 1:
1. Setup a rSeries or VELOS system.
2. Configure LACP LAG with interfaces operationally down.
3. Make sure LACP Trunk is DOWN on F5OS.
4. Upgrade the software.
5. Launch a BIG-IP tenant.
6. Check LACP trunk status inside tenant.

Condition 2:
1. Setup a rSeries or VELOS system.
2. Configure STATIC LAG with interfaces operationally down.
3. Ensure STATIC Trunk is DOWN on F5OS.
4. Launch a BIG-IP tenant.
5. Check the Trunk status inside the tenant. It will be DOWN.
6. Convert LAG type to LACP
7. Check the Trunk status inside the tenant. It will be UP even though it is down on F5OS.

Impact:
LACP Trunk members are shown as working members even though they are DOWN.

Workaround:
Check the interface config. If the admin is disabled, enable it.

Fix:
The status of LACP members is read whenever an LACP member is added as an operational member.


1612217 : A large amount of SPVA DoS allow list entries can overload DMA-Agent causing a tenant to fail to pass traffic

Links to More Info: BT1612217

Component: F5OS-A

Symptoms:
If the DMA-Agent receives a high volume of SPVA allow list entries at once, it may become overwhelmed and stop working. As a result, no traffic will be able to exit the tenant. This can be identified by observing the DMA-Agent using 100% of the cpu.

Conditions:
This is usually seen in configurations where there are many virtual servers configured with a dos profile that contains an IP-based allow list.

The problem does not arise when VIPs are added individually, but it often happens after TMM is restarted following a tenant reboot.

Impact:
Affected tenants will fail to pass any traffic on the data-plane.

The TMSTAT sep_stats.tx_send_drops3 will be incremented.

This issue could also effect other tenants hosted on the same F5OS hypervisor.

Workaround:
Perform the following on the tenant:
tmsh modify sys db dos.forceswdos value true
tmsh save sys conf

To recover the DMA-Agent in F5OS, set the tenant state to “configured” and then set it back to “deployed.

Fix:
The DMA-Agent now handles a high volume of SPVA allow list entries.


1607745-8 : Apache HTTPD vulnerabilities CVE-2024-38476, 2024-38474 and CVE-2024-38475

Links to More Info: K000140618


1603661-1 : SysDescr value returns empty string under SNMPwalk, after performing backup/restore configuration

Links to More Info: BT1603661

Component: F5OS-A

Symptoms:
System config backup/restore resets the system database to default. Due to this, the sysDescr in SNMP will also reset to default.

Conditions:
This occurs after performing F5OS system config backup and restore.

Impact:
The sysDescr in SNMPwalk displays the default value.

Workaround:
Restart the snmpd docker service.

Fix:
The SNMP sysDescr is updated to the correct value after F5OS system config backup and restore operation.


1601985-3 : F5OS unable to transmit frames out to external interface, even though link is reported as UP

Links to More Info: BT1601985

Component: F5OS-A

Symptoms:
Intermittently, one of the external links on the appliance reports a link 'UP' status. However, the system will receive ingress frames on the interface, but no frames will egress the interface.

- An F5OS packet capture will show frames being sent on that link, but they will not egress the interface.

- If the port is a member of an LACP LAG, the LAG status will be reported as LACP_DOWN / OUT_SYNC, and lacpd may log messages similar to the following repeatedly:

lacpd[13]: priority="Info" version=1.0 msgid=0x3401000000000088 msg="Mux_disable_colldist" port_state="Intf=5.0 partnerDefaulted:1 rxState:3 selected:0 txState:0 actorChurn:0 partnerChurn:1 muxState:0 periodicTxState:1 actorState:10000111 partnerState:01000111".

- The interface 'out' counters will not increment.

- The tmctl 'gbx_stat' counters will show incrementing egress packet counters ('egr_pkt_cnt').

- Platform.log may report the transmit direction for the interface MAC as being disabled, although this can occur even if the interface is working properly:

fpgamgr[15]: priority="Info" version=1.0 msgid=0x309000000000016 msg="Configured Interface MAC." INTERFACE="10.0" Tx="Disabled" Rx="Enabled".

Conditions:
-- r5000, r10000, or r12000-series appliance.
-- The first time an interface links up after a system reboot.

Impact:
After a link comes up, the system is unable to transmit frames.

Workaround:
This issue is intermittent, and should not occur after rebooting the appliance.

Use the following procedure if the rebooting does not resolve the issue.



===
Collecting data to determine which interface is in an unexpected state.


On an r5000:
    for i in nw_{0..9}; do echo $i; docker exec system_fpga fpgatool -c "mac enable asw $i"; echo; done

On an r10000 or r12000:
    for j in asw nso; do for i in nw_{0..9}; do echo $j $i; docker exec system_fpga fpgatool -c "mac enable $j $i"; echo; done; done


For example:

nw_7
target is up on 127.0.0.1:1060
TX Enable state: 0 ===> (!!!)
RX Enable state: 1

===

To map the output of one of those to a named interface, see `tmctl gbx_cfg`

r5000:
interface_name link chip
-------------- -------------- ----
1.0 f5sw_link_nw_0 asw
2.0 f5sw_link_nw_1 asw
3.0 f5sw_link_nw_2 asw
4.0 f5sw_link_nw_3 asw
5.0 f5sw_link_nw_4 asw
6.0 f5sw_link_nw_5 asw
7.0 f5sw_link_nw_6 asw
8.0 f5sw_link_nw_7 asw
9.0 f5sw_link_nw_8 asw
10.0 f5sw_link_nw_9 asw

r10000/r12000:
interface_name link chip
-------------- -------------- ----
1.0 f5sw_link_nw_0 nso
2.0 f5sw_link_nw_1 nso
3.0 f5sw_link_nw_2 nso
4.0 f5sw_link_nw_3 nso
5.0 f5sw_link_nw_4 nso
6.0 f5sw_link_nw_5 nso
7.0 f5sw_link_nw_6 nso
8.0 f5sw_link_nw_7 nso
9.0 f5sw_link_nw_8 nso
10.0 f5sw_link_nw_9 nso
11.0 f5sw_link_nw_0 asw
12.0 f5sw_link_nw_1 asw
13.0 f5sw_link_nw_2 asw
14.0 f5sw_link_nw_3 asw
15.0 f5sw_link_nw_4 asw
16.0 f5sw_link_nw_5 asw
17.0 f5sw_link_nw_6 asw
18.0 f5sw_link_nw_7 asw
19.0 f5sw_link_nw_8 asw
20.0 f5sw_link_nw_9 asw

(Note that interfaces 1-10 are on *different chips* when comparing an r5000 and r10000/r12000.)


===

Run the following command to manually enable the affected interface

docker exec system_fpga fpgatool -c "mac enable asw <INTFERACE> 1 1"


For example, the following command will enable interface 8.0 on r5000

docker exec system_fpga fpgatool -c "mac enable asw nw_7 1 1"

===

Wait for 10 second and check the state again.

docker exec system_fpga fpgatool -c "mac enable asw <INTERFACE>"

===

Assuming both RX and TX were enabled in the last step, check the LACP LAG status.

Fix:
None


1598633-5 : CVE-2023-45288 - HTTP/2 endpoint excessive header reading via CONTINUATION frames

Links to More Info: K000148640, BT1598633


1598509-3 : iHealth client can occasionally throw a core file

Links to More Info: BT1598509

Component: F5OS-A

Symptoms:
The iHealth client, accessible with the command line,
system diagnostics ihealth can be used for uploading QKView files to the iHealth service. If this client loses connection to the system database for any reason, it may throw a core file, in the host system's /var/shared/core directory.

Conditions:
System has been up for a long time, and there is a problem with the ConfD database causing the iHealth client to disconnect.

Impact:
A core file may be thrown. The iHealth client will restart if this happens, so functionality is not affected.

Workaround:
Retry the ihealth client operation.

Fix:
The iHealth client will only access the ConfD database when it needs to query information, and not maintain an open connection.


1596625-2 : BE2 GCI interface training failures during runtime results in failure to process networking traffic

Links to More Info: BT1596625

Component: F5OS-A

Symptoms:
On particular rSeries appliances, one or more symptoms could occur during normal operation:
-- High availability stops working
-- Inbound traffic stops
-- Platform.log contains 'DM Tx Action ring hung'

This is similar to the symptoms in https://cdn.f5.com/product/bugtracker/ID1580489.html, except that this can be triggered during system operation.

Conditions:
-- rSeries r5000, r10000, or r12000-series appliance

This issue does not affect r2000 or r4000-series appliances.

Impact:
The system stops delivering traffic from front-panel ports to the host, although egress traffic may continue to work. If a LACP LAG is configured, ports will be unable to join the LAG.

Workaround:
There is no workaround for this issue.

If an appliance has already locked up, rebooting it might restore network connectivity.

If your system is running F5OS-A version 1.5.x, F5OS-A-1.5.2-29198.R5R10.EHF-4.iso is an Engineering Hot Fix (EHF) that contains a software fix, and is available at

https://my.f5.com/manage/s/downloads?productFamily=F5OS&productLine=F5OS_Appliance_Software&version=1.5.2&container=1.5.2-EHF

You can also upgrade to F5OS-A 1.8.0.

Fix:
New FPGA bitstreams stabilize the interface between the ATSE and BE2 chip.


1596149 : Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures

Links to More Info: BT1596149

Component: F5OS-A

Symptoms:
Monitor rSeries ATSE to BE2 links and Raise Alarms in the Event of Failures

Conditions:
F5 rSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
In cases where errors are detected between the ATSE and BE2 links, alarms and events will be reported.

Workaround:
None

Fix:
Monitor ATSE to BE2 links and raise alarms and report events when errors are detected.


1593385-3 : F5OS Tenant Throughput (bits/packets) and TMM CPU usage higher than expected until VLAN is added or removed

Links to More Info: BT1593385

Component: F5OS-A

Symptoms:
Higher CPU usage and throughput from the tenant than expected. Traffic being directed to a single blade in a multi-blade system.

Conditions:
Repeated deletes/adds of a VLAN from/to a tenant. After approximately 130 deletes, the issue occurs.

Impact:
Traffic imbalance, higher than normal CPU usage.

Workaround:
Re-add the recently deleted VLAN to the tenant.

Fix:
Properly clean up internal storage when a VLAN is deleted from a tenant.


1591645-1 : EPVA related dma-agent crash

Links to More Info: BT1591645

Component: F5OS-A

Symptoms:
A dma-agent seg_fault occurs when there is a conflict between special EPVA allow-list entries.

Conditions:
A conflict between two entries on the allow-list triggers a code path in the dma-agent and resulting in a seg_fault.

Impact:
Traffic loss as the dma-agent needs to be restarted by its watchdog/start up script. Tenants need to re-register with the datapath.

Workaround:
None

Fix:
This issue has been fixed by setting a THREAD local variable in the epva_tbl_mgmt thread, preventing a seg_fault when the edge case method is triggered.


1591553-1 : Including /etc/resolv.conf and /etc/hosts files in QKView capture

Links to More Info: BT1591553

Component: F5OS-A

Symptoms:
The /etc/resolv.conf and /etc/hosts files are included to check the configured parameters in host QKView from the affected device.

Conditions:
F5OS-A 1.7.0 and lower versions QKView capture does not include the /etc/resolv.conf and /etc/hosts files.

Impact:
The /etc/resolv.conf and /etc/hosts files are not captured in F5OS-A 1.7.0 and lower versions.

Workaround:
None

Fix:
The /etc/resolv.conf and /etc/hosts files are included in QKView capture as part of F5OS-A 1.8.0 release.


1591549-2 : Support for case-insensitive LDAP username lookup

Links to More Info: BT1591549

Component: F5OS-A

Symptoms:
Previously, username lookup for LDAP-authenticated users was always case-sensitive.

Conditions:
Third-party authentication is configured with LDAP or Active Directory; user(s) in question reside in LDAP directory.

Impact:
Username lookups for authentication/authorization against LDAP directory were always conducted in a case-sensitive fashion, even for directories where case-insensitive was the default for the organization (e.g. Windows AD).

Case-insensitive default is considered a safer security posture. It prevents username masking and cache injection when multiple users that only differ by case, with differing authorization privileges, exist in the same directory.

Workaround:
Always use correct case for case-sensitive searches.

Fix:
A new option was added which allows the admin to enable case-insensitive searches for LDAP username lookups. Note that case-sensitive remains the default for security reasons.


1590173 : K3s server crashes and restarts due to high CPU activity

Links to More Info: BT1590173

Component: F5OS-A

Symptoms:
K3s crashes and restarts due to high CPU load on r2000 platform.

Conditions:
On the r2000 platform, both F5OS and Tenants utilize the same CPUs. However, if the Tenants use a higher percentage of the CPU share, it impacts the K3s server.

Impact:
Tenants will restart when the K3s server restarts.

Workaround:
None

Fix:
It is not advisable to use the r2000 platform with a CPU usage of 90% or higher.


1588961 : Observing "Failed to find the service account - robottpobdefault" or "Creating SA robottpobdefaultfailed" log messages in platform.log

Links to More Info: BT1588961

Component: F5OS-A

Symptoms:
Intermittently you may see log messages saying "Failed to find the service account - robottpobdefault" or "Creating SA robottpobdefaultfailed" in platform.log, this is due to either K3S is down/unreachable or API-Server slow/busy or SSH to host is failed.

Conditions:
When K3S is down/unreachable or API-Server slow/busy or SSH to host is failed, you may see log messages like "Failed to find the service account - robottpobdefault" or "Creating SA robottpobdefaultfailed" in platform.log

Impact:
There won't be any functional impact as the service-account is already present but you are unable to check the status of the service account.

Workaround:
None

Fix:
Removed an excessive log message that occurs while k3s is restarting.


1588093 : Forwarding host log files to remote targets

Links to More Info: BT1588093

Component: F5OS-A

Symptoms:
/var/log/messages grows quickly, consuming the disk space, making the system unusable.

Conditions:
Having /var/log/messages as a host-logs files entry to forward the file lines to a remote destination.

Impact:
When syslog generated files are configured to be forwarded as files, forwarding efficiency can be affected compared to utilizing selectors.

The /var/log/messages being in this list can lead to a cyclical logging issue, where the disk space is consumed faster than the logs can be rotated out, potentially resulting in a full disk.

Workaround:
Use selectors instead for any file that is syslog generated.

The host-logs files configuration is meant for text files that cannot be forwarded through selectors configuration.

Fix:
To prevent filling the disk, files that are forwarded out line by line would not be processed locally. This will prevent having entries in /var/log/messages.


1587925 : Modifying a RADIUS server from the web UI requires the Secret to be configured or re-entered

Links to More Info: BT1587925

Component: F5OS-A

Symptoms:
Modifying a RADIUS server from the webUI always requires the Secret to be configured or re-entered.

Conditions:
Modifying a RADIUS server from the webUI.

Impact:
It requires the Secret to be entered, even if it is already configured.

Workaround:
If secret configuration is not required, edit the RADIUS server from the CLI.

Fix:
Create a Radius server and edit it. Editing the port or timeout fields no longer requires the Secret to enable saving.


1587837-3 : Memory leak in multiple components

Links to More Info: BT1587837

Component: F5OS-A

Symptoms:
A mishandling of memory allocation in the data provider callback library can cause memory allocation to grow over time. This memory usage growth can cause poor performance and the Out Of Memory (OOM) killer may kill components, causing outages.

Conditions:
If a data provider processes overlapping requests it can leak memory. The components most affected by this are the platform-stats, snmp-service, an L2 agent.

Impact:
Components may crash or processes may be killed.

Workaround:
Monitor memory usage and periodically restart daemons that experience excessive memory growth. On a chassis system, a manual failover and rebooting the standby controller will restart all daemons.

To minimize the occurrence of this leak, do not constantly poll for statistics, especially from multiple monitoring stations.

Fix:
The library has been fixed to no longer leak session data.


1585853-2 : Telemetry streaming pauses if mgmt-ip gets updated

Links to More Info: BT1585853

Component: F5OS-A

Symptoms:
Telemetry streaming to an external OTEL server is paused for some time if mgmt-ip of the F5OS device is updated.

Conditions:
There should be a telemetry exporter configured to receive data and the mgmt-ip of the F5OS device will be updated at a later time..

Impact:
The external server won’t receive the telemetry data for some time after updating mgmt-ip.

Workaround:
Disable and enable the exporters from ConfD using below commands to re-establish the connection after updating mgmt-ip.

system telemetry exporters exporter <exporter-name> config disabled

system telemetry exporters exporter <exporter-name> config enabled

Fix:
Updated the otel-collector service in F5OS to re-establish the connection with the external server in the event of a lost connection caused by mgmt-ip updates.


1585765 : Error message IDs for appliance-orchestration-manager are incorrect

Links to More Info: BT1585765

Component: F5OS-A

Symptoms:
The error message IDs found on a running system differ from the error message IDs found in the F5OS error catalog.

Conditions:
No specific conditions in the configuration of the system caused this issue.

Impact:
Makes it difficult to find the right information in the F5OS error catalog.

Workaround:
None

Fix:
This issue has been fixed and the error IDs now have the correct values in both the running system and the F5OS error catalog.


1585749 : Including lspci commands in QKView capture

Links to More Info: BT1585749

Component: F5OS-A

Symptoms:
The lspci command helps in analyzing the system's faults by evaluating PCI buses. This command is not captured in the QKView file.

Conditions:
Running QKView.

Impact:
The lspci command output is not included in the QKView.

Workaround:
None

Fix:
The lspci command is added in QKView capture.


1585001-1 : Radius authentication does not work when the shared secret key in the radius configuration is more than or equal to 32 characters

Links to More Info: BT1585001

Component: F5OS-A

Symptoms:
The remote radius users authentication fails when the radius shared secret has more than 31 characters.

Conditions:
The radius shared secret having more than 31 characters

Impact:
The remote radius users will not access to the system.

Workaround:
Log in as an admin into the system and change the radius 'secret' field to have characters less than or equal to 31.

system aaa server-groups server-group <server-group-name>servers server <server-address> radius config secret-key <number-of-characters-should-be<=31>

Then commit the changes.

Fix:
When the radius secret key is longer than 31, the radius users will not have access to the system.


1583233 : The 'show portgroups' command may not display DDM statistics, or may display stale/out-of-date DDM statistics

Links to More Info: BT1583233

Component: F5OS-A

Symptoms:
An F5OS system (rSeries appliance or VELOS partition) may display stale/out-of-date DDM statistics or no DDM statistics if there are interface in the system that do not have SFP modules inserted.

Conditions:
- r5000, r10000, or r12000-series appliance
- VELOS partition
- Previous interfaces in the system that do not have an SFP module inserted.

Impact:
System does not report correct DDM statistics in 'show portgroups' command output.

Workaround:
Run the ‘show portgroups’ command for each interface that has an SFP module inserted, that is, ‘show portgroups portgroup 5’.

Fix:
Fixed the display issue in ‘show portgroups portgroup state ddm data’.


1582817-1 : Unable to add rSeries device IP to 'known-hosts' file

Links to More Info: BT1582817

Component: F5OS-A

Symptoms:
Trying to add a rSeries device's IP to a 'known-hosts' file using the CLI command 'file known-hosts known-host' fails.

Conditions:
If the remote host is running F5OS-A-1.8.0, then adding that device's IP to 'known-hosts' file using the CLI command 'file known-hosts known-host' fails.

Impact:
File export/import to remote rSeries device from a local rSeries device using secure mode will fail.

Workaround:
File export/import to remote rSeries device from a local rSeries device can be done using other supported protocol such as https.


1582553 : The 'components component state' data is not displayed in ConfD.

Links to More Info: BT1582553

Component: F5OS-A

Symptoms:
- No data will be displayed as part of “show components component” in ConfD.
- In the absence of component platform information, GUI features default to r5xxx platform, leading to some functional issues for other platforms.

Conditions:
Intermittently occurs when initializing the state data.

Impact:
You cannot view the hardware information, which is updated under “show components component”.

GUI functional issues for other platform:
For r10xxx - Raid Configuration will not be visible.
For r4xxx/r2xxx - Port Groups may not function as expected. STP screens and Port Mappings will show up, which are not applicable to the platform and will be non-functional.

Workaround:
Log into the appliance as root and restart the platform-mgr docker container:

docker restart platform-mgr

Fix:
The functionalities disrupted on the GUI can be accessed via the CLI.


1580489 : BE2 GCI interface training issue results in failure to process networking traffic

Links to More Info: BT1580489

Component: F5OS-A

Symptoms:
Some particular rSeries systems fail to process networking traffic due to the BE2 GCI interfaces not training properly, resulting in an FPGA datapath lockup.

One potential indication of this is the DMA agent detecting a DM Tx Action ring hang, which can be observed in velos.log / platform.log:

dma-agent[13]: priority="Alert" version=1.0 msgid=0x4201000000000130 msg="Health monitor detected DM Tx Action ring hung." ATSE=0 DM=0 OQS=3

Conditions:
RSeries r5000, r10000, or r12000-series appliance

This issue does not affect r2000 or r4000 series appliances.

Impact:
The system stops delivering traffic from front-panel ports to the host, although egress traffic may continue to work. If an LACP LAG is configured, ports will be unable to join the LAG.

Workaround:
None, and F5 continues tracking the BE2 issue via ID1596625.

Fix:
During system startup, FPGA manager now ensures that the BE2 GCI interfaces are brought up and trained properly.


1580165 : Removing a failed patch ISO can remove base services imported from a different ISO

Links to More Info: BT1580165

Component: F5OS-A

Symptoms:
Removing a failed patch ISO also removes the base services ISO imported by another ISO. Further upgrade will fail even though importing the patch version is successful. You may observe the below log.

appliance-1(config)# system image check-version iso-version 1.5.2-21056
response Compatibility verification succeeded.

Conditions:
-- Base services are already imported by another ISO.
-- Same version patch ISO import failed.
-- Delete the failed patch ISO.

Impact:
Upgrade to a new successful import of patch ISO of the same version will fail.

Workaround:
Rebooting the device will resolve the issue.

Fix:
While removing the failed patch ISO, added a check that if the base services are imported by another ISO, do not delete the base services ISO.


1579453 : SAN Validation Mismatch: Key/Cert virtual server No Key Configured

Links to More Info: BT1579453

Component: F5OS-A

Symptoms:
When TLS key/cert is set in confd, create-csr accepts invalid SAN values without generating a CSR or errors. Without a key/cert, confdcli correctly validates the CSR.

2: Run create-csr with various san values
appliance-1(config)# system aaa tls create-csr name namesan san ""
----------------------------------------------------------------^
syntax error: "" has a bad length/size. <======== EXPECTED

appliance-1(config)# system aaa tls create-csr name namesan san ''
appliance-1(config)# <===== should give error

appliance-1(config)# system aaa tls create-csr name namesan san "IP"
appliance-1(config)# <======= should give error

appliance-1(config)# system aaa tls create-csr name namesan san "DNS"
appliance-1(config)# <==== should give error

appliance-1(config)# system aaa tls create-csr name namesan san "f5best"
appliance-1(config)# <==== should give error

appliance-1(config)# system aaa tls create-csr name namesan san IP:1.1.1.1
response <====== EXPECTED

Conditions:
Invalid SAN values are accepted

Impact:
Confd accepting invalid SAN values

Workaround:
None

Fix:
Fixed in F5OS-A 1.8.0 and F5OS-C 1.8.0


1579289 : Empty log message when interface changes state

Links to More Info: BT1579289

Component: F5OS-A

Symptoms:
An empty log message is logged:
appliance-1 nic-manager[1]: priority="Info" version=1.0 <msgid=> msg="Updating interface link state" <ifname=> <state=>. >>>>

The empty log message is reported after an interface oper-status changes from either UP/DOWN or DOWN/UP state

Conditions:
An interface is enabled or disabled in F5OS

Impact:
The log message does not report which interface's state changed.

Workaround:
None

Fix:
With the appropriate fix, the empty log is no longer reported


1579181-3 : Rate limit XBAR to sum of speeds of used interfaces

Links to More Info: BT1579181

Component: F5OS-A

Symptoms:
Dropped packets in Gearbox. (tmctl -d blade gbx_stat)

Conditions:
- F5 r5000, r10000, or r12000-series appliance
- Passing traffic when the sum of the speeds of enabled and used interfaces is less than 100G.

Impact:
Dropped packets.

Workaround:
None

Fix:
Rate limit XBAR to avoid dropping packets in Gearbox when using interfaces with speeds less than 100G.


1578553 : Tenant deployment fails with error: "Error mapping SEP file. Unlinking. Disconnecting client."

Links to More Info: BT1578553

Component: F5OS-A

Symptoms:
BIG-IP tenant deployment fails after a F5OS reboot or after a downgrade/upgrade of F5OS.

An error in platform.log is reported: "Error mapping SEP file. Unlinking. Disconnecting client."

Tenant deploy status shows as Pending, with Phase reading "Insufficient memory on node, retrying tenant deployment" and Status showing "No enough memory available for tenant allocation."

Conditions:
Tenant deployment after a downgrade (1.3.2 ISO) and then back
The system is rebooted

Impact:
The issue may lead to tenant deployment error due to insufficient memory on node.

Workaround:
None

Fix:
Fixed an issue preventing a tenant from starting due to insufficient memory.


1577193 : Remote users logged out of WebUI session immediately after successful authentication

Links to More Info: BT1577193

Component: F5OS-A

Symptoms:
When trying to log in to WebUI via LDAP, remote users get kicked out of the session immediately after a successful authentication.

Conditions:
-- LDAP authentication enabled
-- Attempt to authenticate remote LDAP user through the WebUI

Impact:
You are logged out of the session immediately after a successful authentication.

Workaround:
None.


1577049 : CVE-2024-1086 - Linux kernel vulnerability

Links to More Info: K000139430, BT1577049


1576345-3 : Port mode mismatch on QSFP ports can cause interface flaps on other ports

Links to More Info: K000139339, BT1576345

Component: F5OS-A

Symptoms:
When the port mode is mismatched on a Front Panel QSFP port, it can cause port interface flapping on other ports.

Conditions:
A port mode mismatch, such as a 100GE optic installed when the port is configured for 40GE operating mode.

This did not occur on earlier versions so it might be detected after you upgrade to an affected version.

Impact:
The status on other interfaces may incorrectly show ‘down’ when the interface is ‘up’.

Workaround:
Do not operate in a mismatched mode.

Fix:
Updated FPGA firmware is required for the fix.


1576141 : K3S installation fails if /var/log/appliance.log is not present

Links to More Info: BT1576141

Component: F5OS-A

Symptoms:
K3S cluster installation fails.

Conditions:
/var/log/appliance.log is deleted and recreated as directory.

Impact:
K3s cluster installation fails.

Workaround:
Delete /var/log/appliance.log and create it as a file.

Fix:
Added code to verify if the /var/log/applaince.log presents, during K3s installation.


1575925-1 : Running 'show system aaa primary-key state status' while a key migration is in progress can cause key migration errors

Links to More Info: BT1575925

Component: F5OS-A

Symptoms:
If a key migration is in progress (initiated via the ConfD action 'system aaa primary-key set'), and while it is in progress the status of the key migration is checked ('show system aaa primary-key state status'), this can intermittently cause the key migration to fail.

Possible symptoms include:

- Running 'show system aaa primary-key' returns 'application communication failure'.
- Running 'show system aaa primary-key' shows a status of RECOVERY_RESTORE_KEY_FAILED.

Conditions:
1. A ConfD primary key migration is initiated on a VELOS Controller or F5OS Appliance system.
2. While the key migration is in progress, the status of the migration is checked.

Impact:
In the less severe case, further attempts to run 'show system aaa primary-key' may return 'application communication error', but the primary key is intact.

In the worst case, the key migration may fail part way through, leaving encrypted ConfD elements in a corrupted state with little chance of recovery.

Workaround:
If running 'show system aaa primary-key' returns 'application communication error', try to recover it by logging into the controller as 'root' and running:

  docker restart confd-key-migration-mgr

If running 'show system aaa primary-key' shows a status of RECOVERY_RESTORE_KEY_FAILED, please contact F5 Support for assistance.

Fix:
Fixed issue where checking status of key migration could cause the migration to fail.


1575417 : Platform-diag-agent memory leak

Links to More Info: BT1575417

Component: F5OS-A

Symptoms:
Memory usage for the "platform-diag-agent" process may steadily increase over time.

Conditions:
This can happen when frequently requesting “system health components” from ConfD.

Impact:
The system may eventually run out of memory and affect all services on the system.

Workaround:
None

Fix:
Memory leak fixed. Consider reducing the request frequency. The system can also be rebooted to temporarily restore memory usage to normal levels.


1575093-1 : Higher latency in R2K/4K appliances compared to iSeries appliances

Links to More Info: BT1575093

Component: F5OS-A

Symptoms:
Higher latency in R2K/4K compared to iSeries
iSeries: avr 120us / max 5,700us
r2600: avr 1,207us / max 62,706us

Conditions:
Client RTT fluctuates between 430us and as high as 1941us, whilst server reported latency between 17ms and 40ms

Impact:
Latency in time sensitive apps and increase web loading time.

Workaround:
None


1573493 : Qkview does not collect the files gid-map.txt, /etc/libnss-udr/passwd, or /etc/libnss-udr/group

Links to More Info: BT1573493

Component: F5OS-A

Symptoms:
When a QKView is collected, the files gid-map.txt, /etc/libnss-udr/passwd, and /etc/libnss-udr/group are not present in the QKView.

Conditions:
A qkview is collected.

Impact:
It may not be possible to troubleshoot certain issues related to authentication.

Workaround:
None

Fix:
The files gid-map.txt, /etc/libnss-udr/passwd, and /etc/libnss-udr/group have been added to QKView collection. Whenever a QKView is collected, these files are present.


1572929 : Changing remote authentication methods from RADIUS/TACACS to LDAP may break remote-gid functionality.

Links to More Info: BT1572929

Component: F5OS-A

Symptoms:
If RADIUS or TACACS are utilized for authentication, the user’s ‘passwd’ details will be saved in /etc/libnss-udr/passwd. However, if the user switches to LDAP authentication and disables the previous method, their entry may not be removed from /etc/libnss-udr/passwd.

If a user is using GID remapping (by configuring remote-gid), the authentication will fail, at least when logging into the CLI.

Conditions:
- Enable RADIUS authentication and log into the system as a remote RADIUS-defined user.
- Change the authentication method to LDAP and disable RADIUS authentication.
- Configure remote-gid functionality for an LDAP-defined user. This LDAP-defined user should have the same name as the RADIUS-defined user.
- Log into the system as that remote LDAP-defined user.

Impact:
The authentication will fail for the LDAP-defined user. An error message will appear such as: “No valid role group found in user groups: 9002 123 5340”.

Workaround:
Log into the system as a ‘root’ user and clear the information in /etc/libnss-udr/passwd.

Fix:
The remote-gid functionality will no longer be affected by changing authentication methods from RADIUS/TACACS to LDAP. LDAP users with valid credentials will be allowed in.


1572597 : System loses its mgmt-ip address after switching between static and dynamic allocation (DHCP) of IP and rebooting

Links to More Info: BT1572597

Component: F5OS-A

Symptoms:
Device not reachable on static IP when DHCP is disabled.

Conditions:
1. Configure static IP and enable DHCP.
2. Disable DHCP and reboot the device.
3. Device is not reachable on static IP.

Impact:
Device connectivity.

Workaround:
Static IP needs to be configured through console.

Fix:
Fixed code to persist static IP.


1572493 : LAG Trunk Configuration is Missing Inside of Tenant

Links to More Info: BT1572493

Component: F5OS-A

Symptoms:
When creating a LACP LAG or Static LAG, the lag and its members will show as up on the F5OS and switch side (Arista and Cisco). However, on the tenant, tmsh will show that neither the trunk nor trunk members are present:
root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)# list net trunk
root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)#

Conditions:
BIG-IP tenant on F5OS system

Impact:
The trunk information will not be visible in the tenant.

- On high-end rSeries appliances (r5000, r10000, and r12000-series systems) and VELOS tenants, traffic will still work.

- On low-end rSeries appliances (r2000 and r4000-series systems), traffic will not flow.

Workaround:
NA


1572489 : User accounts with username which includes only numeric values or special characters like "." or ".." or starts with '-' are inactive

Links to More Info: BT1572489

Component: F5OS-A

Symptoms:
User accounts created with username that include only numeric values are inactive or non-functional. Also, usernames starting with dash ‘-’, contain only “.”, “..”, or any invalid characters (other than letters, digits, underscores, dashes and $ (at the end)) creates non-functional user accounts.

Conditions:
User account with username containing only numerics or starts with dash '-' or username like "." or ".." are non-functional.

Impact:
Non-functional user accounts are created. User functionalities like set-password, change-password, or other would not be working as expected.

Workaround:
None

Fix:
User account creation with invalid username will not be possible. An error will be displayed for invalid usernames.

Following is an example:
appliance-1(config)# system aaa authentication users user 12345676578 ?
Possible completions:
  Error: "12345676578" is an invalid value.

There wont be 'config' option available to create/configure new user account until you provide valid usernames.


1572137-2 : Upload/Download API should work with '/api' and '/restconf'

Links to More Info: BT1572137

Component: F5OS-A

Symptoms:
Upload/Download is not working with '/api' endpoint.

Conditions:
Use '/api' endpoint to upload/download a file.

Impact:
Fails to Upload/Download a file.

Workaround:
None

Fix:
Fixed an issue occurring with the Upload/Download API.


1567945 : QAT entries for the deleted tenant still show up in cluster

Links to More Info: BT1567945

Component: F5OS-A

Symptoms:
When a tenant is deleted and a reboot scenario such as a live upgrade is performed, a reference to the deleted tenant remains in the cluster via ConfD and internally in qat-support-pod.

Conditions:
Deletion of a tenant occurs just before a reboot.

Impact:
Incorrect reporting through ConfD.

Workaround:
None

Fix:
A monitor checks for changes to tenant configurations. Upon detecting deletion or un-deployment, the qat-devs.json file is promptly updated. Subsequently, the tenant is marked as terminated, thereby notifying the informer to refrain from updating device records with outdated values.


1566925 : Remove unhelpful troubleshooting files from QKView

Links to More Info: BT1566925

Component: F5OS-A

Symptoms:
Creating a QKView on an F5OS host appears to make a non-sparse copy of /var/log/lastlog
This file is a sparse file and depending on factors, can have a really large file size, though actual consumed disk blocks remain quite low.

Conditions:
Creating a QKView file on F5OS.

Impact:
Exhausted disk space and caused K3s to reap pods to free up ephemeral storage - including killing running tenant (BAD).

Workaround:
Remove the files.

Fix:
None


1566569-1 : Unable to access rSeries system from 172.17.0.0/16 IP subnet

Links to More Info: BT1566569

Component: F5OS-A

Symptoms:
Unable to access the rSeries system from client or server systems in the 172.17.0.0/16 IP subnet

Conditions:
-- r5000-series, r10000-series, or r12000-series appliance

Impact:
Unable to access the rSeries system from client or server systems in the 172.17.0.0/16 IP subnet

Workaround:
To work around this issue, do the following:

1. Log into the system as root
2. If running F5OS-A 1.7.0, edit /var/docker/config/platform.yml. If running F5OS-A 1.5.2, edit /var/docker/config/platform.patch.yml.
3. In the specified file, locate the section for "selinux_labeler", and add a line under it that reads 'network_mode: "none"'. The indentation of this line must match exactly the indentation of the "container_name" and "image" lines.

For example:
  selinux_labeler:
    container_name: selinux_labeler
    network_mode: "none"
    image: ${...
    ...

4. Reboot the system.
5. Once the system is rebooted, log into the system as root, and run "docker network rm config_default"


1560533-1 : Inconsistent case values (upper and lower case) for different F5OS-C SNMP OIDs

Links to More Info: BT1560533

Component: F5OS-A

Symptoms:
AlertSource in SNMP alert contains text as Controller starting with uppercase C instead of lower case in core alert events.
Similarly, for core alert events generated in blade, comes with Blade instead of blade.

Conditions:
Process crash generating core file and SNMP alerts are enabled.

Impact:
Tools processing SNMP alerts might get affected if tooling is case-sensitive.

Workaround:
None

Fix:
Fixed alertSource text for SNMP core alert events to send lower case.
Tools modified to read alertSource of SNMP core alert events require to update as per the correction.


1558797 : BMC self health test falsely logged as failed

Links to More Info: BT1558797

Component: F5OS-A

Symptoms:
The BMC self health test is randomly logged as having failed:

appliance-1 alert-service[8]: priority="Notice" version=1.0 msgid=0x2201000000000029 msg="Received event." event="65543 appliance aom-fault EVENT NA "Bmc Health Self test failed: Device-specific 'internal' failure." "2024-03-01 14:00:00.918553424 UTC"".

Conditions:
Checking the platform log

Impact:
BMC self health test is falsely logged as failed.

Workaround:
None

Fix:
This issue has been fixed and the BMC self health test no longer falsely logs a failure.


1552945 : Tenant images renamed with bracket are not supported

Links to More Info: BT1552945

Component: F5OS-A

Symptoms:
Live upgrades with prior releases with tenants that use images with brackets in their name will fail when going to a version that restricts the tenant image name character set.

Conditions:
Tenants using image filename with brackets won't allow upgrades to releases that validate the image filename character set.

Impact:
The tenant will have to be recreated or upgrade to a version that does not have the validation.

Workaround:
Tenant has to be recreated with the original image that didn't contain brackets.

Fix:
Brackets were included in accepted character set for tenant image filename.


1550413-1 : System events visible in the CLI may not be visible in the GUI

Links to More Info: BT1550413

Component: F5OS-A

Symptoms:
Running "show system events" on the F5OS CLI typically reveals many events that are not visible in the GUI under System Settings > Alarms & Events.

The GUI filters the display of events according to their assigned severity. But since many events are not assigned a severity, such events will be hidden from view.

Conditions:
Events that are not assigned a severity are instead marked "NA". Such events are not visible in the GUI and can only be seen via the CLI or API.

Impact:
The omission of events displayed in the GUI can be misleading. Administrators using the GUI may not be aware of important events that have occurred on the platform.

Workaround:
All system events can be seen by running 'show system events' on the F5OS CLI or by retrieving them via the REST API.

Fix:
On fixed versions, a new option called 'All' has been added to the Severity drop-down selector in the GUI. This displays all events, including ones without a severity assigned.


1549753 : System telemetry exporter send queue and retry settings are causing memory issues

Links to More Info: BT1549753

Component: F5OS-A

Symptoms:
Memory issues are seen in system when telemetry exporter is not reachable for a long time.

Conditions:
When exporter is not reachable for a long time.

Impact:
System can go out of memory.

Workaround:
User can disable the send queue and retry setting using ConfD. For example:

appliance-1(config)# system telemetry exporters exporter <<exporter name>> config options send-queue-enabled false

appliance-1(config)# system telemetry exporters exporter <<exporter name>> config options state options retry-enabled false

Fix:
Send queue and retry settings are removed for telemetry exporters.


1536413 : Allowed-ips allowed-ip <name> is not accepting the '-' in the names

Links to More Info: BT1536413

Component: F5OS-A

Symptoms:
Allowed IP profile got deleted while upgrading to 1.7.0 from lower versions. allowed-ip profile names with '-' got erased out. which got fixed in 1.8.0

Conditions:
While upgrading to 1.8.0 from lower versions other than 1.7.0, all allowed IP profile names should have atleast one alphanumeric and it should have not have any other special character other than ('-', '_' and '.')

Impact:
Allowed IP profile gets deleted if it is not matching the pattern.

Workaround:
Re-apply the allowed-IP profile configuration without eiphen '-' in the name

Fix:
Fixed the schema such that allowed IP profile name accepts the '-' in profile name.


1519869 : BIG-IP tenant reports blank interface

Links to More Info: BT1519869

Component: F5OS-A

Symptoms:
BIG-IP tenant reports a blank ("") interface member in the trunk when removing one or more interfaces from an aggregation.

Conditions:
When removing one or more interfaces from an aggregation.

Impact:
BIG-IP tenant has an empty member in the trunk.

Workaround:
None.

Fix:
BIG-IP tenant does not report a blank ("") interface member in the trunk when removing one or more interfaces from an aggregation.


1505589-1 : Subject-Alternative-Name (SAN) feature now supports client-side SSL Validation

Links to More Info: K000139300, BT1505589

Component: F5OS-A

Symptoms:
Since no SAN was allowed to be inserted into the http-server’s self-signed certificate, client-side SSL validation was not supported.

This impacts Central Manager's VELOS/rSeries provider. The missing SAN field causes the certificate to be rejected.

Conditions:
Using the default self-signed certificate.

Impact:
Client-side SSL validation is not supported.

Workaround:
To add an SAN, you need to edit the /etc/pki/tls/openssl.cnf file and add it. However, this may not be effective for certain software that does not accurately read the configuration file.

Fix:
A new SAN field has been implemented, which is mandatory, and allows users to enter a value in the field. However, if the value “none” is used, the field can be omitted. Additionally, to allow entry of the SAN, a default tls certificate is created in /etc/auth-config/default/f5os.cert that has the SAN populated with the hostname and management-ip values. In the absence of a user-provided self-signed certificate, the http-server will automatically use the default certificate.


1505293-1 : Partition image removal message is truncated

Links to More Info: BT1505293

Component: F5OS-A

Symptoms:
If a partition is enabled and then disabled while running version A, and then upgraded to version "B", attempting to deport partition image "A" fails, the CLI throws truncated error messages.

Conditions:
The partition is upgraded with the state is disabled.

Impact:
Incomplete error messages for the failure reason. The error that is reported is:

"Error: Failed to remove software: 1.5.1-14085, error message: Standby removal failed for following reason: OS version".

Workaround:
None


1505221-2 : If accidentally import bad ISO images, it may not removed automatically

Links to More Info: BT1505221

Component: F5OS-A

Symptoms:
When you accidentally import ISO images from a faulty URL, they cannot be removed or replaced with the correct URL.

Conditions:
User accidentally imports faulty ISO images to the system.

Impact:
Deleting and importing system ISO images might have an impact.

Workaround:
Login to the command line with root user access and remove the image via 'rm' under '/var/import/staging', and import the correct ISO.

Fix:
Please refer to the workaround and further detail.


1498413-3 : CVE-2023-28484: A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.

Links to More Info: K000139641


1498009-1 : Learned L2 entries in data-plane L2 forwarding table may disrupt some traffic flows between tenants

Links to More Info: BT1498009

Component: F5OS-A

Symptoms:
While a tenant transitions from active to standby, an egress packet in flight may trigger a L2 learn event in the FPGA data-plane. This can occur for tenants that transmit using a different MAC address while active, such as when MAC masquerading is enabled. If so, a dynamic L2 entry is created from the source MAC address of the egress packet. These dynamic entries also enable the service DAG without setting a service ID, which causes matching packets to be dropped in the VOQ system due to an invalid service DAG lookup result.

This can disrupt egress traffic for another tenant on the same device, attempting to transmit to the destination MAC address that was recently relinquished by the standby tenant. These drops increment the 'ic_voq_drops' counter in the tmctl vqf_global table.

These L2 entries will not be corrected by subsequent L2 learn events for the same MAC address from a different location. Thus, traffic disruption may persist until entries age out.

Conditions:
- MAC masquerade configured on the traffic-group of an HA pair of tenants.

- A failover from tenant A to tenant B.

- Another tenant running alongside tenant 'A' attempts to transmit to the MAC masquerade address that is now owned by tenant 'B'.

Impact:
Traffic disruption from one tenant to another in specific directions.

Workaround:
None

Fix:
L2 entries that are created from host generated L2 learn events, no longer enable the service DAG for matching packets.


1497657 : First SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges

Links to More Info: BT1497657

Component: F5OS-A

Symptoms:
The first SSH login after editing role-based privileges for a remote RADIUS or TACACS+ user will still give the user their prior privileges (or, if the user is newly created, login will be rejected with a message saying "This account is currently not available"). Subsequent logins will apply the updated user privileges.

Conditions:
1. RADIUS or TACACS+ Authentication is enabled.
2. A new user is created in one of the above auth systems, or an existing user’s role-based access is modified.
3. The affected user SSHs into F5OS for the first time after the change in step #2.

Impact:
First login to system after creation fails, or first login after modification of user privileges gives the user incorrect privileges.

Workaround:
None

Fix:
Fix issue where first SSH login after editing remote RADIUS or TACACS+ user privileges will still apply old privileges.


1497385-1 : F5OS SNMP IF-MIB::ifAlias missing from snmpwalk

Links to More Info: BT1497385

Component: F5OS-A

Symptoms:
The following SNMP MIB OID from IF-MIB table is missing on F5OS-A and F5OS-C.

1.3.6.1.2.1.31.1.1.1.18

Example snmpwalk result:

~ % snmpwalk -c public -v 2c 10.10.10.33 1.3.6.1.2.1.31.1.1.1.18
IF-MIB::ifAlias = No Such Instance currently exists at this OID

Conditions:
Snmpwalk -c public -v 2c 10.10.10.33 1.3.6.1.2.1.31.1.1.1.18
IF-MIB::ifAlias = No Such Instance currently exists at this OID

Impact:
Cannot get results for MIB OID
 
1.3.6.1.2.1.31.1.1.1.18

Workaround:
None

Fix:
We have added the support for OID 1.3.6.1.2.1.31.1.1.1.18 (IF-MIB::ifAlias), which will represent the value for interface description.


1496977 : Remote GID mappings to F5OS roles are disconnected for TACACS+/RADIUS authentication methods.

Links to More Info: BT1496977

Component: F5OS-A

Symptoms:
Remote GID mappings (on a TACACS+ or RADIUS server) to F5OS GIDs/roles are not working correctly. When attempting to configure a remote mapping, it results in the access rejection with a message similar to below:

[root@system ~]# ssh radius_or_tacacs_user@<F5OS system mgmt IP>
Password:
Last login: <date> from <source IP>
No valid role group found in user groups: '9000'
Connection to <mgmt IP> closed.

Conditions:
A remote GID mapping is configured for a role in F5OS and the authentication method used for remote users is RADIUS or TACACS+.

Impact:
Remote users cannot log in to the system.

Workaround:
Configure remote user's GIDs in a way that they correspond to the GIDs in F5OS for the desired role(s). Then, remove any remote GID mappings in the F5OS configuration.

Fix:
Fixed remote GID mapping to F5OS roles for TACACS+/RADIUS authentication methods.


1496837-1 : User-manager's ConfD socket getting closed.

Links to More Info: BT1496837

Component: F5OS-A

Symptoms:
After repeating the change of network type and device reboot, the device goes into a state where the user-manager is not interacting with ConfD.

Conditions:
- Change remote GID role and check '/etc/gid-map.txt' file if the value is reflected.
- Switch network type and reboot the device.

Repeat the above process until '/etc/gid-map.txt' file is not been updated correctly.

Impact:
Any ConfD configuration change that goes through user-manager fails. This includes any of the user’s password changes, or remote GID changes.

Workaround:
Rebooting the system will get the correct GID value from the ConfD and update the '/etc/gid-map.txt' file.

Fix:
The user-manager has no reason to use NSS to lookup any PW/group info, as it deals exclusively with the local user database.

Additionally, there is a ZMQ service that belongs in authentication-mgr (which understands remote authentication) that is in the user-manager container. It forces user-manager to use an ‘/etc/resolv.conf’ that can reference remote sources.

If the user-manager trips over a lookup that goes to LDAP (usually a local-db miss), it can be very slow and time out. The ConfD->user-manager channel is sensitive of slow responses, and shuts down subscriber/callpoint handler/daemon that takes over 15 to 30 seconds to respond. When this happens, the user-manager is going to see an EOF on its ConfD sockets.

This fix forces the user-manager to only lookup on local databases.


1496397-1 : Allowing entry of a Subject-Alternative-Name (SAN) for certificate and CSR creation

Links to More Info: BT1496397

Component: F5OS-A

Symptoms:
There is no method available for inputting the SAN field during the creation of certificates or CSR.

Conditions:
While creating a CSR through system aaa tls create-csr in ConfD.

Impact:
The option to include the SAN field in certificates and/or certificate request is not available.

Workaround:
To add an SAN, you need to edit the /etc/pki/tls/openssl.cnf file and add it. However, this may not be effective for certain software that does not accurately read the configuration file.

Fix:
A new SAN field has been implemented, which is mandatory, and allows users to enter a value in the field. However, if the value “none” is used, the field can be omitted. Additionally, to allow entry of the SAN, a default tls certificate is created in /etc/auth-config/default/f5os.cert that has the SAN populated with the hostname and management-ip values. In the absence of a user-provided self-signed certificate, the http-server will automatically use the default certificate.

As this is a new feature, back-porting to older versions has not been implemented and would be difficult and complex.


1496393 : A key can be created rather using a stored key for CSR creation

Links to More Info: BT1496393

Component: F5OS-A

Symptoms:
When creating a Certificate Request (CSR), a key must be provided. Since a key was provided by the 'store-tls' option for the TLS key, it was assumed that the CSR was intended to be used with that specific key.

Conditions:
Generating a CSR request via system aaa tls create-csr in confd

Impact:
The certificate request (CSR) functionality is not as flexible as it could be (similar to the self-signed certificate, which allows a key to be created). It is complex to create certificate requests where a new key is required.
Additionally, the absence of a stored key meant that no CSR could be produced.

Workaround:
Create a new key, store it in TLS, and run the create-certificate-request.

Fix:
The create-certificate request now allows a key to be created, or, if none exists, it creates one. If no key is requested and one exists, the process will continue as usual, generating a CSR using the pre-existing key. However, if a key is requested (or does not exist), a new one will be created and both the key and CSR will be shown. It is important to note that a CSR without knowing the key is of no use.


1495337-1 : FIPS Password Initialization Failure with Special Characters

Links to More Info: K000154661, BT1495337


1494945 : ConfD Application Error when tenant interface stats are not available

Links to More Info: BT1494945

Component: F5OS-A

Symptoms:
When attempting to get tenant interface stats, the system displays "Error: application error".

Conditions:
The creation or modification of tenants may result in inaccurate handling of historical data by the tenant interface-stats logic. This could lead to the display of an “Error: application error” message when queried.

For example:
appliance-1# tenants tenant cbip-tenant-b state interface-stats down-sample-to 10 average 10s-avg
Error: application error

Impact:
Confd reports the error on the command line and logs the error in platform logs.

2024-01-24T20:12:37.123437567Z: [Error]: confd: msg="Action Point reply error" error="confd error: 'Unknown error', last='Invalid confd_vtype value: 0', errno=5"

Workaround:
None

Fix:
The problem has been resolved in more recent versions of F5OS-A. To resolve it, upgrade to a more recent version of F5OS-A. It will resolve once all interfaces are enabled.


1494809 : Allowing user to configure HostKeyAlgorithms parameters

Component: F5OS-A

Symptoms:
A new config CLI (system security services service sshd config host-key-algorithm) is implemented to allow HostKeyAlgorithms configuration.

Conditions:
In non FIPS mode, to enable or disable ssh-rsa HostKeyAlgorithm, this newly implemented CLI can be used.

Impact:
HostKeyAlgorithm usage was not configurable.

Workaround:
None

Fix:
This is a new CLI that can be used to enable or disable ssh-rsa HostKeyAlgorithm


1494209-4 : CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function

Links to More Info: K000138814


1492621-2 : Config-restore fails when backup file has expiry-status field for admin or root user

Links to More Info: BT1492621

Component: F5OS-A

Symptoms:
For a root or admin user, if the value for Expiry-status in the backup file is not set to enabled, then config-restore fails.

Conditions:
During backup, if the "Expiry-status" value for admin or root user is not set to enabled, then restore fails with the backup.

Impact:
Database config-restore fails.

Workaround:
For admin and root user, comment expiry-status, expiry-date in the backup file and try to restore.

Fix:
Added NACM rules in ConfD for successful config-restore.


1492401 : User with operator role is not having read-access to all pages

Links to More Info: BT1492401

Component: F5OS-A

Symptoms:
- User experiences unauthorized error when trying to access "Tenant Images", "Software Management", "File
Utilities", "Configuration Backup", and "System Report"

- User sees no items when trying to access "File Utilities", "Configuration Backup", and "System Report" pages

Conditions:
User has operator role.

Impact:
User is not able to view certain pages.


1490753 : A linkUp and linkDown traps are sent when an up interface is disabled, and vice versa

Links to More Info: BT1490753

Component: F5OS-A

Symptoms:
When F5OS system is configured with SNMP Targets for managing the Trap notifications, linkUp and linkDown traps will be sent when interface state is toggled.

Conditions:
Always two traps (linkUp and linkDown) will be sent even when the interface state is toggled from UP to DOWN or DOWN to UP.

Impact:
No functional impact, but when two traps are sent, the interface state over SNMP can be misleading.

Workaround:
None

Fix:
The appropriate trap, that is, linkDown trap when F5OS interface state is down and linkUp trap when F5OS interface state is up, will be sent.


1486697 : Configuring Expiry-status of root and admin users should not be allowed

Links to More Info: BT1486697

Component: F5OS-A

Symptoms:
Expiry-status of root and admin users are allowed to be configured and there is a chance of locking out these users.

Conditions:
If Expiry-status of any root or admin user is marked as Locked, that root or admin user cannot log in to the system.

Impact:
There is a chance that default users, such as root and admin, become locked out.

Workaround:
None

Fix:
You cannot edit the ‘Expiry-status’ field in webUI for admin and root users. Thus, it cannot be configured. The 'Expiry-status' field for root and admin users will now always display the default value as 'Enabled'.


1481797 : Voltage sensor limits incorrect, causing notice messages on r2000 & r4000 appliances

Links to More Info: BT1481797

Component: F5OS-A

Symptoms:
The rSeries 2000 and 4000 appliances can incorrectly report voltage sensor errors when the values are within the allowed range.

platform 2023-10-16 19:00:01.263 Z Error appliance-1 diag-agent[8] msgid=0x098200000000001a msg="Component Attribute Changed" component="appliance/hardware/bmc" attribute="p5a:sensor:voltage:p1v05nac" severity="Notice" value="1.03" interface="diag-controller"

platform 2023-10-15 19:00:01.322 Z Error appliance-1 diag-agent[8] msgid=0x098200000000001a msg="Component Attribute Changed" component="appliance/hardware/bmc" attribute="p5a:sensor:voltage:p0v83x557" severity="Notice" value="0.81" interface="diag-controller"

The 2 sensor limits above should be:

- P1V05_NAC == 1.05V +/- 30mV
- P0V83_X557 == 0.83 (0.76V - 0.85V)

This means log messages that report voltage values within the limits can be safely ignored.

Conditions:
RSeries appliances r2x00 or r4x000

Impact:
This is a cosmetic issue.

Workaround:
Review the warning to ensure it is within the defines ranges stated above.

Fix:
The system will not log errors when P1V05_NAC and P0V83_X557 are within the accepted limits.


1472917 : LDAP authenticated admins logging in via the serial console may have trouble disabing appliance mode during system instability

Links to More Info: BT1472917

Component: F5OS-A

Symptoms:
If ConfD is not running, F5OS offers an emergency option to disable appliance mode when an administrator logs in successfully via the serial console.

Conditions:
The admin role has been configured with a remote-gid that is not 9000 and the admin successfully authenticates via LDAP on the serial console while ConfD is not running.

Impact:
Remotely-authenticated admin users cannot disable appliance mode if ConfD is offline.

Workaround:
None

Fix:
Remotely-authenticated admin users can disable appliance mode if ConfD is offline.


1470917 : LAG aggregated speed is not updated

Links to More Info: BT1470917

Component: F5OS-A

Symptoms:
LAG's aggregation state lag-speed value is not the aggregate of the member port's actual speed.

Conditions:
Individual port auto-negotiates to a value lower than its initial port speed configuration.

Impact:
The actual speed of the LAG is not displayed when running the show interfaces interface aggregate command. This is just a display issue, with no impact on the actual bandwidth of the LAG.

Workaround:
None

Fix:
The LAG speed reflects accurately the sum of the operational speed of members.


1469401 : ARP request for mgmt interface IP resolving to mgmt0-system inferface's mac

Links to More Info: BT1469401

Component: F5OS-A

Symptoms:
1. Configure IP on mgmt0-system from ConfD.
2. Configure IP on mgmt using linux command.
3. ARP request to mgmt-ip resolves to MAC of mgmt0-system.

Conditions:
Configuring IP on mgmt interface using linux and nmcli/ip commands.

Impact:
No impact

Workaround:
None

Fix:
Added code changes to make F5OS to resolve to the correct MAC for mgmt-ip.


1469385 : GUI freezes during LDAP user authentication if no remote GID mapped locally.

Links to More Info: BT1469385

Component: F5OS-A

Symptoms:
The LDAP remote user authentication freezes for a long time (more than a minute).

Conditions:
When trying to authenticate a remote LDAP user through the GUI without mapping any of the remote user GIDs to the F5OS local roles.

Impact:
Authentication freezes for a long period before rejecting the user.

Workaround:
One of the remote GIDs should be mapped to the local F5OS roles.

Fix:
Map the remote GID(s) to the F5OS role(s) to authenticate remote LDAP users successfully.


1468545 : Inconsistency with time zones displayed in log files

Links to More Info: BT1468545

Component: F5OS-A

Symptoms:
PEL logs in F5OS systems are logged in a different time zone, not the configured time zone.

Conditions:
If the configured time zone is different from UTC, then the PEL logs can display different time for log messages.

Impact:
Troubleshooting and tracing issues can be difficult, as the time zones used in different logs do not match.

Workaround:
None

Fix:
PEL logs in F5OS systems are logged in the applicable time zone.


1467273 : LCD restarting internal services periodically due to memory allocation error.

Links to More Info: BT1467273

Component: F5OS-A

Symptoms:
On a r2000/r4000 system, the LCD may experience an issue causing it to repeatedly restart the ‘platform_monitor’ or ‘bmcservice’ service due to a memory allocation problem.

The lcd.log file displays recurring patterns of log messages such as:

lcd platform_monitor[1581] Traceback (most recent call last):#012 File "/usr/sbin/platform_monitor.py", line 540, in <module>#012 raise e#012OSError: [Errno 12] Cannot allocate memory
lcd /etc/watchdog.d/platform_monitor_watchdog.sh: found platform_monitor is not running
<snip>
lcd watchdog[1424]: test binary /etc/watchdog.d/platform_monitor_watchdog.sh returned 255
lcd /etc/watchdog.d/platform_monitor_watchdog.sh: Trying to repair platform_monitor ...
<snip>
lcd /etc/watchdog.d/platform_monitor_watchdog.sh: platform_monitor successfully repaired, pid = 27676

A similar condition may occur for the 'bmcservice' service.

lcd /etc/watchdog.d/bmcservice_watchdog.sh: found bmcservice is not running
lcd watchdog[1436]: test binary /etc/watchdog.d/bmcservice_watchdog.sh returned 255
lcd /etc/watchdog.d/bmcservice_watchdog.sh: Trying to repair bmcservice ...
lcd /etc/watchdog.d/bmcservice_watchdog.sh: bmcservice successfully repaired, pid = 26226

Conditions:
Excessive LCD memory consumption may occur if the appliance is turned off while external power is still connected. This excess memory usage will not be resolved when the appliance is turned on again.

Impact:
While the LCD is operating in this state, it may not be able to obtain the PSU status from the BMC and update the PSU status LEDs accordingly.

Furthermore, the LCD may not be able to ascertain the system’s current power state from the BMC.

Workaround:
The excessive LCD memory consumption can be recovered by rebooting the LCD.

1) Log into the appliance as a root user.
2) Issue `docker exec -it platform-hal psf call POST:lcd/reboot waitForBootup=true` at the Linux prompt.
3) Wait 60–90 seconds for the LCD to complete a reboot.

Example:

[root@appliance-1:Active] ~ # docker exec -it platform-hal psf call POST:lcd/reboot waitForBootup=true
  field | value
----------+--------
  success | true

Fix:
The excessive LCD memory consumption is fixed in LCD firmware v1.01.069.00.1 and later.


1466397-1 : LDAP authentication is consuming several minutes to authenticate via GUI and SSH.

Links to More Info: BT1466397

Component: F5OS-A

Symptoms:
LDAP authentication is working fine. However, authentication takes several minutes, which lacks a user-friendly experience.

Conditions:
- Configure LDAP server-group.
- Configure LDAP_ALL as an authentication-method.
- Log in using LDAP user via GUI or SSH.

Impact:
The user is forced to wait for several minutes to get the result of LDAP authentication.

Workaround:
None

Fix:
Removed unnecessary GID lookup to speed up LDAP authentication.


1462929-3 : Platform-deployment script logs are now captured in both its dedicated log file and the systemd journal

Component: F5OS-A

Symptoms:
The platform-deployment script used bare echo statements for all output, meaning log messages were not persisted to a dedicated log file and were not captured in the systemd journal. This made it difficult to troubleshoot platform service deployment issues (e.g., container startup failures, registry setup, OS rebase errors) after the fact, as the output was only visible in the service status and could be lost on rotation or reboot.

Conditions:
Any F5OS-A or F5OS-C system running the platform-services-deployment service during upgrade/downgrade, reboot, or service start/stop operations.

Impact:
Reduced observability during platform service deployment. Operators had limited ability to diagnose historical deployment failures, Docker Compose errors, or registry setup issues because log messages were transient and not written to a persistent, searchable location.

Workaround:
Prior to this fix, operators could manually inspect systemctl status platform-services-deployment.service -l for recent output, but historical logs were not reliably available.

Fix:
Added structured logging to the platform-deployment script. All output is now timestamped and written to a dedicated log file (/var/log/platform-deployment.log) with logrotate support, and simultaneously forwarded to the systemd journal via StandardOutput=journal on the service unit. This enables operators to use both journalctl -u platform-services-deployment and the persistent log file for troubleshooting platform service deployment issues


1461289-1 : On a rSeries appliance, config-backup proceed is broken

Links to More Info: BT1461289

Component: F5OS-A

Symptoms:
On a rSeries appliance, system database config-backup 'proceed' is broken. It is about overwriting an existing backup file, but it prompts you to proceed even if a file does not exist.

Conditions:
System database config-backup always prompts for the user to proceed even if a file does not exist.

Impact:
No functional impact. When you provide input 'yes', the backup file will be generated.

Workaround:
When prompted to 'proceed', you must respond with 'yes'.

Fix:
The system database config-backup prompts the user with ‘proceed’ option only when the file exists and the user is not provided ‘proceed yes’ in the input CLI command.


1461109 : GUI error "Unable to get data from stream streams/platform-stats/json"

Links to More Info: BT1461109

Component: F5OS-A

Symptoms:
When viewing usage visualizations on screens that support them (Tenant details, Dashboard cpu Tab etc.), sometimes when switching between browser tabs an error in notification stream occurs.

Conditions:
-- Viewing a screen that shows data visualizations using notification streams
-- Switching between different browser tabs.

Impact:
An error message is dislayed in place of the visualzation charts.

Workaround:
Refreshing the page will start the notification stream again and user should start seeing data visualisations

Fix:
This issue is happening because GUI is trying to disconnect and reconnect to stream when switching between tabs. This behaviour is prevented now the stream will stay connected even when user switched to different tab.


1455913 : Tcpdump on F5OS does not honor the -c flag

Links to More Info: BT1455913

Component: F5OS-A

Symptoms:
When using Tcpdump on F5OS with the -c flag, Tcpdump will not stop after receiving the given number of packets.

Conditions:
A Tcpdump session is started with the -c or --count flag.

Impact:
The Tcpdump session will not terminate after receiving the requested number of packets and will continue until manually terminated.

Workaround:
N/A

Fix:
Tcpdump now honors the -c flag and will terminate after receiving the given number of packets.


1451181 : The Rest API call to list core files returns 500 error when no core files found.

Links to More Info: BT1451181

Component: F5OS-A

Symptoms:
The ConfD List Core Files Rest API call request returns a 500 ERROR when no core files are found rather than returning an empty list.

Example:
https://10.10.10.1:8888/restconf/data/openconfig-system:system/f5-system-diagnostics-qkview:diagnostics/f5-system-diagnostics-qkview:core-files/f5-system-diagnostics-qkview:list

Conditions:
1. No core files exist on the system.
2. The Rest API for querying the list of core files is made.

Impact:
Limited, but may affect automation.

Workaround:
Automation can respond to 500 error.

Fix:
Instead of responding with a 500 error, the response is now "none" when no core files exist.


1441425 : The rSeries appliance log shows "PSU voltage out value < lower limit, value=0".

Links to More Info: BT1441425

Component: F5OS-A

Symptoms:
The following message appears in the logs:
66305 psu-1 psu-fault EVENT Network Access "PSU voltage out value < lower limit, value=0" "2023-12-08 09:00:00.900082135 UTC".

Conditions:
The conditions that trigger this issue are unknown at this time.

Impact:
Users see several "PSU voltage out value < lower limit, value=0" logged messages, which could be falsely reported.

Workaround:
None

Fix:
None


1441333 : Rasdaemon memory leak

Links to More Info: BT1441333

Component: F5OS-A

Symptoms:
Rasdaemon will increase in size when excessive (>10000) MCE memory error events occur and may lead to system instability.

Conditions:
Likely due to memory hardware resulting in MCE errors

Impact:
System instability

Workaround:
Rebooting could be a temporary work-around if MCE rate is excessive.

Fix:
Rasdaemon version is upgraded in the current F5OS release.


1437765-2 : Restoration of system configuration database may fail if admin user was previously modified

Links to More Info: BT1437765

Component: F5OS-A

Symptoms:
The restoration of the System Configuration Database fails with this error:
appliance-1(config)# system database config-restore name config_database1 proceed yes
Error: access denied
Database config-restore failed.

Conditions:
In F5OS-A 1.5.1, the expiry status of the ‘admin’ user has been modified even before the System Configuration Database is saved and restored on the device that is currently installed after RMA/factory or F5OS clean install.

Impact:
Unable to restore the System Configuration Database.

Workaround:
1. In F5OS-A 1.5.1, it is recommended not to lock or modify the expiry status of the ‘admin’ user on the RMA/factory or clean installed appliance. If modified, enable the user before taking the backup.
2. Edit the System Configuration Database backup file. For the admin and root user, remove the next line which is highlighted by the arrow, then restore the configuration using the modified file:
           <username>admin</username>
           <config>
             <username>admin</username>
             <password><REMOVED></password>
             <last-change>0</last-change>
             <expiry-date>-1</expiry-date>
             <role>admin</role>
             <expiry-status>enabled</expiry-status> <---


1436153 : F5OS upgrades fail when SNMP configuration contains special characters.

Links to More Info: BT1436153

Component: F5OS-A

Symptoms:
As part of some security fixes, added a special character restriction in SNMP configuration in F5OS-A 1.5.1. This resulted in an upgrade failure to 1.5.1. If an upgrade to 1.5.1 is successful, the SNMP configuration will get deleted implicitly.

Conditions:
Upgrade to 1.5.1 fails when the SNMP configuration contains any special characters. The restricted special characters are: /*!<>^,/

Impact:
If the user encounters this issue, the system will go to an inaccessible state and require a forced downgrade.

Workaround:
Delete the SNMP configuration (community, target, or user) containing special characters before performing an upgrade to 1.5.1.

Fix:
The special characters in the SNMP configuration do not inject any security issues and can have special characters. Hence, the special characters restriction is removed in F5OS-A 1.5.2 and F5OS-A 1.8.0.


1429741 : Appliance management plane egress traffic from F5OS-A host going via BIG-IP Next tenant management interface instead of host management when both are in same subnet

Links to More Info: BT1429741

Component: F5OS-A

Symptoms:
When BIG-IP Next tenant is installed, a default route rule is added on host. If tenant management and host management IPs are on same subnet, then two similar rules are created with destination as same subnet.

The tenant route rule is created with higher priority (metric 0) resulting any management egress traffic destination belonging to same subnet is going through tenant management interface instead of host management interface.

Conditions:
BIG-IP Next tenant is deployed on appliance.

Impact:
End users receiving traffic from appliance, will observe sender IP as tenant management interface instead of host management interface.
    Note:
        a. This issue will be observed only when host management & tenant management subnet is same and also destination to which data is sent is on same subnet.
        b. This impacts management plane traffic within the appliance's management subnets.

Workaround:
N/A

Fix:
N/A


1429721 : SCP as non-root user does not report errors correctly for bad/non-existent files.

Links to More Info: BT1429721

Component: F5OS-A

Symptoms:
Using SCP to retrieve files from F5OS as "admin" or other non-root users should report a proper error when attempting to access an invalid directory or non-existent file.

Instead, the SCP command does nothing, reports no error, and exits with an on-zero exit status.

Conditions:
Attempt to read a non-existent/inaccessible file via SCP.

Impact:
The user is not informed about the failed SCP operation and the reason for the failure.

Fix:
SCP server software now reports errors the invalid/inaccessible filenames.


1420481 : Observing continuous log messages "Found correct SSH ECDSA key in authorised keys." in /var/log/messages

Links to More Info: BT1420481

Component: F5OS-A

Symptoms:
Seen repeated logs of "Found correct SSH key" approximately every 20 seconds in /var/log/messages.

Conditions:
These logs are seen every 20 seconds from the time of system startup.

Impact:
Flooding of /var/log/messages log file with "Found correct SSH ECDSA key in authorized_keys".

Workaround:
None

Fix:
Orchestration Manager now redirects these log messages to the /dev/null


1411137 : Audit log entries are missing when creating or deleting objects via UI or API

Links to More Info: BT1411137

Component: F5OS-A

Symptoms:
When creating or deleting multiple remote-server related objects via UI or API, multiple restart happens causing log message drop.

Conditions:
While creating or deleting multiple objects related to remote-server, rsyslog restart everytime to apply new configuration. Due to the restart, some log messages are dropped.

Impact:
Log messages are dropped due to multiple restarts of the rsyslog.

Workaround:
None


1411101 : "Error pf_nic_get_media" failed error for ports with or without SFP connected

Links to More Info: BT1411101

Component: F5OS-A

Symptoms:
Error pf_nic_get_media failed for connected or not connected ports coming intermittently.

Conditions:
One or more ports are not connected on R2k/R4K devices.

Impact:
The error is confusing because the port does not have an SFP connected.

Workaround:
None


1410445 : The system's power state may be incorrectly indicated by the Status LED

Links to More Info: BT1410445

Component: F5OS-A

Symptoms:
The power state on an r2000/r4000 system may be incorrectly indicated by the Status LED when the system is in standby.

When an r2000/r4000 system is in the standby power state, the Status LED should be solid amber. Instead, the Status LED may be blinking amber which indicates that communication between the LCD and host CPU has been lost.

Conditions:
An r2000/r4000 system in standby power state.

Impact:
No functional impact.

Workaround:
None

Fix:
Fixed in LCD firmware v1.01.068.00.1 and later.


1408477 : When more than one PCIe AER error has occurred, diag-agent reports this as a "RAS AER 'unknown' error" instead of the individual AER errors.

Links to More Info: BT1408477

Component: F5OS-A

Symptoms:
When more than one PCIe AER errors are occurred simultaneously, diagnostics will not report the events.

Conditions:
This occurs when more than one PCIe AER errors occur simultaneously.

Impact:
You are unable to see the individual PCIe errors.

Workaround:
None

Fix:
Updated diagnostics to consider and report more than one PCIe AER errors when occurred simultaneously.


1403817-1 : SNMP IF-MIB misreport the status and speed of LACP LAGs

Links to More Info: BT1403817

Component: F5OS-A

Symptoms:
SNMP polling on IF-MIB provides incorrect status and speed of LACP Lag interfaces.

Conditions:
The issue is seen only on SNMP interface. The correct status and speed display on CLI or GUI.

Impact:
The user will see inappropriate status and speed details when polled for IF-MIB details on SNMP for LACP LAG interfaces.

Workaround:
None

Fix:
Fixed the issue to display the correct values of LACP LAG interfaces in IF-MIB SNMP polling.


1403781 : Modifying mgmt interface's description will trigger interface flapping

Links to More Info: BT1403781

Component: F5OS-A

Symptoms:
Management interface description commit may cause an interface flap.

Conditions:
Change the mgmt interface description for first time and commit.

Impact:
There is a mgmt interface flap.

Workaround:
None


1403749 : Memory leaks in tcam-manager

Links to More Info: BT1403749

Component: F5OS-A

Symptoms:
TCAM Manager leaks a small amount of memory at each rule add or delete operation.

Conditions:
Memory leak happens with rule add/delete operations. These rules are generated by TMM during hardware offload.

Impact:
High memory utilization and eventual OOM.

Workaround:
None

Fix:
Allocated objects are now properly freed.


1401965-1 : Copying BIG-IP ISO to /var/import/staging/, leaves ISO loopback mounted

Links to More Info: BT1401965

Component: F5OS-A

Symptoms:
An error occurs:
ERROR: sw-mgmt: priority=error msgid=0x3501000000000154 msg=Unexpected error processing "import /var/export/chassis/import/iso/<image>.iso": [Errno 30] Read-only file system: 'ace-1.1.7-0.0.3.i686.rpm'

Conditions:
Copying a BIG-IP ISO to /var/import/staging/ (rather than /var/F5/system/IMAGES or /var/F5/partition<num>/images)

Impact:
An error occurs and the ISO loopback remains mounted

Workaround:
None

Fix:
Fixed in F5OS-A/C 1.8.0


1401945-4 : CVE-2023-3899: subscription-manager : inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration

Links to More Info: K000137798


1401841 : Out of memory issues are seen when multiple telemetry exporters are configured

Links to More Info: BT1401841

Component: F5OS-A

Symptoms:
Out of memory issues are seen when too many telemetry exporters are enabled.

Conditions:
When the system is configured with too many exporters with exporter options as "retry-enabled" as "true" and "send-queue-enabled" as "true", and exporter end points are not reachable from device.

Impact:
This will increase memory utilization of the system and could cause the restart of random processes/services to free up the memory.

Workaround:
Disable the unreachable telemetry exporters from ConfD
"system telemetry exporters exporter <name> config disabled"

If there are too many exporters configured, disable some of the exporters.

Fix:
N/A


1401621 : Modifying a remote server with multiple selectors from the web UI removes the AUTHPRIV configuration.

Links to More Info: BT1401621

Component: F5OS-A

Symptoms:
The AUTHPRIV option is not available on the webUI. Modifying a remote log server, which has multiple servers, from the webUI removes the AUTHPRIV configuration

Conditions:
Modifying a remote server with multiple selectors from the webUI.

Impact:
The AUTHPRIV selector has been removed from the configuration.

Workaround:
To modify the configuration of a remote server with more than one selector, use the CLI.

Fix:
Added AUTHPRIV option to the webUI. Modifying the configuration of a remote server with more than one selector from the web UI will not remove AUTHPRIV from the configuration


1400221 : OpenTelemetry exporters may not produce data upon first tenant being added to system

Links to More Info: BT1400221

Component: F5OS-A

Symptoms:
Telemetry streaming stops when the first tenant is configured.

Conditions:
When OpenTelemetry exporters are configured before the first tenant is configured within F5OS, this can lead to a condition where the exporters stop streaming metrics and logs.

Impact:
OpenTelemetry exporters stop producing metrics and logs.

Workaround:
The work-around is to disable and re-enable all exporters from the ConfD CLI.

system telemetry exporters exporter <name> config disabled

system telemetry exporters exporter <name> config enabled

Fix:
N/A


1399929-1 : F5OS permits non-existent ethernet interfaces to be configured

Links to More Info: BT1399929

Component: F5OS-A

Symptoms:
F5OS allows you to manually type in non-existent interfaces of type "ethernetCsmacd" when adding an interface component.
The system later prohibits you from deleting this non-existent interface while the type is ethernetCsmacd.

Conditions:
User-triggered command for non-exposed interface type.

Impact:
The configuration contains a non-existent ethernet interface with no actual activity.

Attempting to delete the interface from the Partition CLI will result in the following error :

Partition-1(config)# no interfaces interface 1/1.1

Warning: Some elements could not be removed due to NACM rules prohibiting access.

From the Partition GUI The Network-> interfaces Page will show blank

"There are no items to show in this view."

Workaround:
Delete the non-existent interface.

Depending on the type of the created interface , there are 2 ways to delete it .

In case the interface is not a valid interface for the blade such as 25.0 or even a fake name like "example" you can delete it using "no interfaces interface 25.0"

If the interface is for a real interface, for example you have created interface 1/1.1 while the portgroup is in 100G mode (only 1.0 is valid) you will need the following procedure to delete it :

From from the Controller running the Active Partition

Login to controller that is the active one for the needed partition (can be seen via "show partitions" command on the controller). Also from "show partitions" on the controller check the partition ID.
From controller bash: docker exec -it partition2_manager bash (assuming the partition ID is 2)

From inside the partition run the following:
confd_cmd -c "mdel /interfaces/interface{1/1.1}"

Fix:
With this fix, F5OS will reject the creation of ethernetCsmacd.


1398889 : rSeries r5000: assertion in qat-device-plugin FilteringResourceEventHandler.OnDelete causing k8s panic

Links to More Info: BT1398889

Component: F5OS-A

Symptoms:
Crash log gets printed in run_plugin.log

Conditions:
The application internally crashes some time during tenant deletion.

Impact:
No functional impact. The log keeps increasing with crash log when it happens.

Workaround:
It automatically recovers by restarting the application.

Fix:
N/A


1398341 : The affinity script crash seen in /var/log/cron logs

Links to More Info: BT1398341

Component: F5OS-A

Symptoms:
Affinity script crashes due to unhandled exceptions.

Conditions:
Due to an unhandled null reference, sys-affinity crash is seen.

Impact:
No impact. system-affinity will restart within 1 minute.

Workaround:
N/A

Fix:
N/A


1398145 : The 'file list' command takes a long time and the webUI is stuck in loading

Links to More Info: BT1398145

Component: F5OS-A

Symptoms:
When the 'file list' command is used, it takes a lot of time to get the results for the log/host path. This causes the webUI to be stuck in loading.

Conditions:
Using 'file list' command for log/host.

Impact:
The webUI will not be able to load the files in the log/host.

Workaround:
N/A

Fix:
Optimized the code to achieve faster performance when handling file lists.


1397145 : Unable to add blade to Openshift cluster if VELOS partition root password is expired or locked

Links to More Info: BT1397145

Component: F5OS-A

Symptoms:
If a VELOS partition root password is expired or locked, the system may be unable to add the blade to the Openshift cluster (or manage the cluster).

The "show cluster" command output will report that a blade is reachable ("able to ping"), but will not be able to connect to it ("able to SSH"):

                                                          ABLE ABLE
                                        IN READY TO TO PARTITION
INDEX NAME INSERTED CLUSTER CLUSTER PING SSH STATE LABEL
--------------------------------------------------------------------------------------------------
1 blade-1.chassis.local true false false true false Not In Cluster
2 blade-2.chassis.local true false false true false Not In Cluster
3 blade-3.chassis.local true false false true false Not In Cluster

Conditions:
-- VELOS partition
-- root account in partition is expired or locked

Impact:
- Blade will not join Openshift cluster.
- Unable to deploy Tenants to blade.

Workaround:
Re-enable the root user account for the partition:

system aaa authentication users user root config expiry-status enabled


1394993-1 : Upon configuration changes, the l2-agent container restarts with a core.

Links to More Info: BT1394993

Component: F5OS-A

Symptoms:
On systems running F5OS-A or F5OS-C, wen the owner field of the fdb entry is updated by the system, for L2_LISTENER entries, l2_agent crashes.

Conditions:
Configuration changes triggered by system for L2_LISTENER fdb entries. Note that this field is not used by STATIC fdb entries, but the problem can be reproduced easily with STATIC entries.

Impact:
When l2_agent crashes there is a potential disruption to configuration processing.

Workaround:
None

Fix:
The fix will avoid the crash, and the update of the owner leaf will be processed accordingly.


1394913-1 : Rare LACPD crash during process termination

Links to More Info: BT1394913

Component: F5OS-A

Symptoms:
LACPD crashes, generating a core file.

Conditions:
While the LACPD process terminates, it may crash. Operations such as a host reboot and software upgrade cause the process to terminate.

Impact:
A core file is generated. No functional impact to the system.

Workaround:
N/A

Fix:
LACPD no longer crashes during process termination.


1394905 : Unable to create AOM user

Links to More Info: BT1394905

Component: F5OS-A

Symptoms:
When setting up another user in system AOM, a user gets the error "Unable to set AOM ssh username and password --------> failed".

Conditions:
- Creating a second username in AOM
- Using the same password as the first username

Impact:
User cannot create a second username and password.

Workaround:
When creating a new username and password, you must use a different password from the first password that was used.
If you wish to setup a new username using the same password, you must first run "system aom clear-data" to clear out the old username and password combination.

Fix:
Update: User can now set a new username with the existing password.


1394857 : Cannot retrieve AOM username after creating it

Links to More Info: BT1394857

Component: F5OS-A

Symptoms:
There is no way to retrieve the AOM username after setting it.

Conditions:
Setting the AOM username and password in ConfD: "system aom set-ssh-user-info username password"

Impact:
If the user forgets their username, there is no way to retrieve it.

Workaround:
You can use "system aom clear-data" to reset all the information and set a new username and password.

Fix:
N/A


1394205-2 : NTP CLI/webUI displays "ntp api, the server or underlying service is unreachable"

Links to More Info: BT1394205

Component: F5OS-A

Symptoms:
1. Newly configured DNS IPs are not used for FQDN resolution.
2. show system ntp command is unresponsive.

Conditions:
1. The file /etc/resolv.conf is not correctly mounted or configured inside the container.
2. Invalid or unresponsive DNS IPs configured.

Impact:
1. The "ping" command unable to use recent configured DNP IPs
2. Timeout occurs when you execute "show system ntp".

Workaround:
None

Fix:
1. Ping now correctly uses newly configured DNS servers.
2. The show system ntp command responds faster.


1394045 : Misleading "unable to read AOM SSH login banner" errors are found

Links to More Info: BT1394045

Component: F5OS-A

Symptoms:
The AOM SSH login banner is an optional field, but a misleading error "unable to read AOM SSH login banner" is found in logs if you do not configure it.

Conditions:
Configure AOM SSH and check the AOM info. The errors will appear in the log.

Impact:
Benign errors "unable to read AOM SSH login banner" are found in the log.

Workaround:
N/A

Fix:
Fixed on F5OS-A 1.8.0. The "unable to read AOM SSH login banner" error does not appear if banner has not been configured.


1393669 : On adding a member to an existing LAG on webUI, the newly added member's speed does not add up to the LAG's "Current Speed" instantly and requires a reload to see the expected response

Links to More Info: BT1393669

Component: F5OS-A

Symptoms:
The status for the newly added member shows as "down" in the REST response and the newly added member's speed does not add up to the "Current Speed" of the LAG on the webUI/REST response.

Conditions:
Occurs on the webUI when adding a member to an existing LAG.

Impact:
"Current Speed" for the LAG appears stale as it does not reflect the newly added member's speed.

Workaround:
The issue only stays momentarily. If the user refreshes the screen, it shows the LAG's Current Speed appropriately.

Fix:
N/A


1393269 : Error log: "PINGLOOP Failed to ssh to 127.0.0.1"

Links to More Info: BT1393269

Component: F5OS-A

Symptoms:
"PINGLOOP Failed to ssh to 127.0.0.1" logged in platform.log by Appliance Orchestration Manager.

Conditions:
1. root user locked with expiry status set to "locked".
2. Appliance rebooted after locking root user.

Impact:
Internal processes relying on root user may malfunction.

Workaround:
Avoid locking the root user account by not setting the expiry status to "locked".
Use appliance mode for root user lockdown.


1391625 : Hugepages do not get de-allocated after BIGIP NEXT tenant HA disassembly

Links to More Info: BT1391625

Component: F5OS-A

Symptoms:
After BIGIP NEXT tenant HA disassembly, the huge pages allocated for the HA-deployment pod do not get de-allocated. This can be checked in /proc/meminfo.

Conditions:
This bug can be observed after HA disassembly.

Impact:
No functional impact. 38 MB huge pages will not be available for other processes after the disassembly of HA. After the reassembly of HA, the same huge pages will be used.

Workaround:
N/A

Fix:
N/A


1390425-1 : Libvirt core is generated on downgrade from 1.7.0 -A to 1.6.0 -A

Links to More Info: BT1390425

Component: F5OS-A

Symptoms:
A flawed core file is generated intermittently on downgrade from 1.7.0 -A to 1.6.0 -A. The tenant remains healthy and functional after reboot.

Conditions:
Occurs intermittently when a system downgrades from 1.7.0 -A to 1.6.0 -A.

Impact:
A libvirt core file is generated, but the tenant is actually healthy and functional.

Workaround:
N/A

Fix:
N/A


1388961 : A few SEL entries in /var/log/platform/sel have missing details

Links to More Info: BT1388961

Component: F5OS-A

Symptoms:
A few SEL entries in /var/log/platform/sel have missing details or might be blank.

Conditions:
For r2000 and r4000 systems, a few SEL entry types are not fully parsed and details will not be available, particularly those that typically appear during a system restart.

Impact:
No functional impact, but with missing SEL log entries it can be difficult to investigate other problems.

Workaround:
None

Fix:
Improved the logging of SEL entries.


1388945 : Fan speed randomly shows as '0'.

Links to More Info: BT1388945

Component: F5OS-A

Symptoms:
The fan speed is randomly and incorrectly reported as '0'.

Conditions:
Checking the sensors using GET:bmc/sensors.

Impact:
The fan speed is reported as '0'.

Workaround:
None

Fix:
This issue has been fixed, and the fan speed no longer randomly reports as '0'.


1388777-4 : CVE-2022-43750: kernel: memory corruption in usbmon driver

Links to More Info: K000139700, BT1388777


1388745 : Large numbers of platform-hal errors logged in platform.log: "Requested Sensor, data, or record not present."

Links to More Info: BT1388745

Component: F5OS-A

Symptoms:
The platform-hal service is intermittently logging a large number of messages similar to the following in platform.log:

appliance-1 platform-hal[8]: priority="Err" msg="Action Error" index=0 message="Requested Sensor, data, or record not present." interface="job-665402" actionKey="GET:lop/pel" jobId=665402

There may be tens of thousands of log messages in some cases.

Conditions:
The conditions that trigger this issue are unknown at this time.

Impact:
The platform.log file becomes filled up with many of these log messages, and they must be filtered out to review the logs effectively.

Workaround:
None

Fix:
None


1388477 : Default GID group mapping authorized even when GID mapped to different group ID

Links to More Info: K000139503, BT1388477


1381661 : LDAP external authentication fails if there is no group definition for user's primary GID

Links to More Info: BT1381661

Component: F5OS-A

Symptoms:
LDAP external authentication (e.g. REST API or GUI; but not ssh) fails in the following scenario:
- User is defined in external auth system (e.g. LDAP)
- User has a primary GID assigned
- There is no group definition for user's primary GID

While this is legal, because the numeric GID should be sufficient, when we try to look up the group info and fail, this short circuits authentication resulting in an error.

Conditions:
- User is defined in external auth system (e.g. LDAP)
- User has a primary GID assigned
- There is no group definition for user's primary GID

Impact:
Externally defined users may not be able to log in.

Workaround:
Define a group for the user's primary group ID.

system aaa authentication roles role <group name> config remote-gid <group ID>

Fix:
LDAP external authentication no longer fails if there is no group definition for user's primary GID. The numeric GID is sufficient.


1381385-1 : Additional password policy settings

Links to More Info: BT1381385

Component: F5OS-A

Symptoms:
Youa are unable to configure min-days, warn-age, and remember when configuring a password policy.

min-days: a limit on how many days a user must wait between password changes
warn-age: indicates how many days before their password expires a user will be warned
remember: indicates the number of previous user passwords that will be saved in the system

Conditions:
Configuring the password policy

Impact:
It is not possible to configure mid-days, warn-age, remember.

Workaround:
None

Fix:
You can now configure warn-age, min-days, and remember when setting a password policy.


1381277 : Most recent login information is not displayed in F5OS webUI

Links to More Info: BT1381277

Component: F5OS-A

Symptoms:
The most recent login information is not available in the F5OS webUI. These details can only be accessed through the CLI.

Conditions:
When using F5OS webUI.

Impact:
To access the most recent login information, you must use the CLI.

Workaround:
Use CLI command 'show last-logins' to access the recent login information.

Fix:
From F5OS-A 1.8.0, the most recent login information can be found in the User & Roles screen of the F5OS webUI.


1381205-3 : CVE-2023-39325 - HTTP/2 rapid reset

Links to More Info: K000152389, BT1381205


1381177-4 : CVE-2023-39325 - HTTP/2 rapid reset

Links to More Info: K000152389, BT1381177


1381109 : WS-2022-0322 - d3-color 2.0.0 package

Component: F5OS-A

Symptoms:
Versions of d3-color prior to 3.1.0 are vulnerable to a Regular expression Denial of Service.

Conditions:
N/A

Impact:
F5OS-A 1.8.0 may be affected by WS-2022-0322

Workaround:
N/A

Fix:
d3-color has been upgraded to an unaffected version.


1381057 : Opening and closing preview pane is causing the page scrollbar to disappear on View Tenant Deployments screen

Links to More Info: BT1381057

Component: F5OS-A

Symptoms:
On the "View Tenant Deployments" screen, when there are a significant number of tenants on the tenant data table, there will be a page level scroll. Opening and closing the preview pane by clicking on any row makes the page level scroll bar disappear.

Conditions:
User should be on the "View Tenant Deployments" screen and there should be many tenants configured on the system so that user can see a page level scroll bar.

Impact:
Opening and closing preview pane is causing the page level scrollbar to disappear making it impossible for a user to scroll down and see the tenants that are out of scroll view.

Workaround:
N/A

Fix:
The issue is now fixed and opening and closing preview pane no longer hides the page level scrollbar. The user can scroll down to see the tenants that are hidden in scroll view.


1379865 : F5 rSeries ATSE2 v72.5.3.00 firmware

Links to More Info: BT1379865

Component: F5OS-A

Symptoms:
ATSE2 v72.5.3.00 firmware

Conditions:
RSeries r5000, r10000, or r12000-series appliance.

This update is not applicable to r2000 or r4000-series appliances.

Impact:
Not applicable.

Workaround:
Not applicable.

Fix:
Fixes RRDAG issues. See ID1347997 or ID1785385 for more information.


1379845 : CVE-2023-3341:bind: stack exhaustion in control channel code may lead to DoS

Links to More Info: K000137582, BT1379845


1379625 : Changing the max-age attribute in password policy is not reflecting immediately

Links to More Info: BT1379625

Component: F5OS-A

Symptoms:
Even after setting max-age value (maximum age, in days, after which password will be expired) less than 7 days, the warning for password expiration is not displaying at the time of next login.

Conditions:
Set max-age attribute to less than 7 (days) and check if password expiration warning is prompted at the time of next login.

Impact:
Password expiration feature is not working as expected.

Workaround:
N/A

Fix:
Fix is provided to sync the max-age value, updated from ConfD CLI, with the user's password expiration attribute in the /etc/shadow on the system.


1379565-1 : Observing QKView start from 100% and then going back to 1%

Links to More Info: BT1379565

Component: F5OS-A

Symptoms:
On a second execution of QKView, it is possible that the percent complete reported by the system diagnostics QKView status command will remain at the previous setting until the QKView collection set-up has been completed. This has no effect on the QKView collection, but it can be confusing.

Conditions:
QKView is executed two or more times.

Impact:
Confusing percent-complete number for a few moments.

Workaround:
Wait for a few moments until QKView capture set-up has finished (up to 30 seconds).


1378805 : Error occurs when changing LAG type for an existing LAG interface on webUI

Links to More Info: BT1378805

Component: F5OS-A

Symptoms:
On the webUI, if a LAG type changes from LACP, an error displays when that LAG type changes back to LACP.

Conditions:
The error occurs when attempting to change the LAG type on an existing LAG interface to a previously used type.

(i.e. Creating a LAG interface with type LACP, changing that type to Static, and then changing it back to LACP)

Impact:
This issue does not affect functionality; however, an unnecessary "Object Already Exist" error pop-up appears.

Workaround:
To avoid the pop-up, change the LAG type to LACP using the CLI in this scenario.

Fix:
Changing the LAG type on an existing LAG interface to a previously used type no longer triggers an error pop-up on the webUI.


1378313 : CVE-2020-22218: libssh2: use-of-uninitialized-value in _libssh2_transport_read

Links to More Info: K000138219, BT1378313


1377257 : Qkview can crash collecting telemetry database

Links to More Info: BT1377257

Component: F5OS-A

Symptoms:
If there is activity in the telemetry database while qkview is collecting it, the collection of the platform monitoring container will be incomplete, due to the qkview collection executable crashing.

Conditions:
Telemetry database is in flux during a qkview collection

Impact:
1. A qkview core file will be created.
2. platform monitor container debug data is not collected

Workaround:
Re-run qkview

Fix:
The qkview configuration file for the platform monitor has been revised so that the telemetry database will not be truncated.


1375133 : K3S is getting reinstalled after live upgrade, even though there is no K3S version change

Links to More Info: BT1375133

Component: F5OS-A

Symptoms:
The CLI "show cluster install-status" shows K3S as installing, even though there is no version change. This happens just after live upgrade.

Conditions:
This issue is seen during reboot just after live upgrade.

Impact:
There is no functional impact.

Workaround:
N/A

Fix:
N/A


1366417-3 : Long BIG-IP tenant names will cause not having virtual console access

Links to More Info: BT1366417

Component: F5OS-A

Symptoms:
No access to the BIG-IP tenant virtual console.

Conditions:
BIG-IP tenant name is longer than 32 characters.

Impact:
The creation of the tenant-console user fails, preventing access to the virtual console for that tenant.

Workaround:
Use tenant names that don't exceed 32 characters in length.

Fix:
Warn the user when using BIG-IP tenant names that exceed 32 character in length.


1366337 : Adding a system raid drive fails after successful removal

Links to More Info: BT1366337

Component: F5OS-A

Symptoms:
If the system is set up using bare-metal installation of F5OS-A 1.5.1, the user will not be able to add a SSD after removing an existing SSD from RAID.

Conditions:
The system must have been bare-metal installed using F5OS-A 1.5.1.

Impact:
User is unable to remove/add SSD into RAID.

Workaround:
N/A

Fix:
SSD can be added and removed from RAID.


1366157 : Warning needed about creating tenant with same name as existing user account name

Links to More Info: BT1366157

Component: F5OS-A

Symptoms:
When a tenant is created with the same name as an existing user account, the end user will not be able to log into the tenant console with that user account. A warning is not included.

Conditions:
Creating the tenant with the same name as an existing user account.

Impact:
The end user will not be able to connect to the tenant mgmt-ip with the user account.

Workaround:
Delete and re-deploy the tenant again with a different name.

Fix:
A warning that a console user won't be created if it matches the same name as a user account has been added.


1365985 : GID role mapping may not work with secondary GID

Links to More Info: BT1365985

Component: F5OS-A

Symptoms:
When a user in an external authentication system (LDAP, Radius, TACACS) is given a GID for an F5 role, and that GID is a secondary GID, the role assignment may not be discovered. This would result in the inability to access the system or be able to configure the system for that user.

Conditions:
- User in an external authentication system (LDAP, Radius, TACACS)
- GID corresponding to F5 role is a secondary GID (for example, it is not the user's default GID, rather a GID from a group to which the user belongs)

Impact:
Inability to log into the system, or inability to configure the system for the user in question.

Workaround:
The GID for the desired role should be the GID directly mapped to the user in the external authentication system (for example, in LDAP, the gidNumber on the user object should be the F5 role GID), rather than a secondary GID (for example, in LDAP, the gidNumber on a group of which the user is a member).

Fix:
All GID role mappings are properly considered when discovering role assignments for users in external authentication systems.


1365977 : Container daemons running as PID 1 cannot be cored on-demand

Links to More Info: BT1365977

Component: F5OS-A

Symptoms:
- kill -QUIT (or any other core-producing signal) to a container process running as PID 1 does not cause a core file.

- Actual runtime errors do generate cores as expected.

Conditions:
Containers that run their services directly as PID 1.

Impact:
Not possible to force a core file for diagnostic purposes.

Workaround:
None

Fix:
Containers that were running directly as PID 1 have been modified to use a minimal "init" process to catch and forward signals to the real service process.

The command:

"docker exec {containername} kill -QUIT 1"

can be used to core a daemon running as a child of /dev/init.

More complicated containers that have multiple processes running under 'bash' script may need to use

"docker exec {containername} kill -ABRT -1"

Note that if the "docker kill" or "docker stop" commands are used instead of "docker exec", the container will not restart, resulting in an inoperative system.


1365821 : Traffic loss of 5-10 seconds after disable/enable of LACP Lag member on r5000/r10000

Links to More Info: BT1365821

Component: F5OS-A

Symptoms:
Disabling and then re-enabling a LACP Lag member can result in traffic loss of up to 10 seconds on r5000/r10000 platforms.

Conditions:
Disable then re-enable LACP Lag member on r5000/r10000 platforms.

Impact:
Traffic loss lasting up to 10 seconds.

Workaround:
N/A

Fix:
Don't hold a mutex while processing the set of links to initialize. Make a copy of the links and release the mutex instead.


1361117 : ha-1-deployment pod may get restarted when tenant HA is configured

Links to More Info: BT1361117

Component: F5OS-A

Symptoms:
When HA is configured on the BIG-IP Next tenants, a new pod of name <tenant-name>ha-1-deployment-<replica-set-hash>-<pod-id> will get created in the tenant namespace.

In some cases, the pod restart count may be 1.

Conditions:
When HA is set up on BIG-IP Next tenants on r-Series.

Impact:
No functional impact. The pod will come to running state automatically.

Workaround:
N/A

Fix:
N/A


1360905 : Unexpected log messages in /var/log/boot.log post-integrity recovery

Links to More Info: BT1360905

Component: F5OS-A

Symptoms:
Users may observe the following inappropriate log message in /var/log/boot.log after recovering from integrity failure:

Sep 28 08:45:08 appliance-1 journal: FIPS Integrity Check: This system has been placed in an error state. Try to recover the system using /usr/libexec/ostree_recover utility or reinstall the system. On many devices pressing the escape key followed by '(' key will bring up a menu that allows the system to be restarted.

Conditions:
The integrity failure occurs when the device is in FIPS mode, and a user alters or removes a file, subsequently executing an on-demand integrity test or a boot-up integrity test.

Impact:
There are no noticeable performance issues or anomalies associated with these log messages, and the issue does not affect the overall system performance or user experience. There are no potential risks or security concerns related to the inappropriate log messages.

Workaround:
N/A

Fix:
The code has been modified to provide more user-friendly log messages.


1359897 : rSeries link down events can be missed

Links to More Info: BT1359897

Component: F5OS-A

Symptoms:
The rSeries platform can occasionally fail to detect a link going down due to the removal of the cable.

Conditions:
Remove fiber optic cable.

Impact:
Links that are DOWN stay operationally UP. This can lead to erroneous LACP and/or LAG state.


1359277 : ConfD CLI timed out and subsequently sees Error: application communication failure

Links to More Info: BT1359277

Component: F5OS-A

Symptoms:
CLI times out if the respective action is not completed within the specified time interval.

Conditions:
The action to perform takes more time than the specified timeout interval.

Impact:
Unable to perform ConfD action.

Workaround:
The respective container can be restarted or a system reboot can be performed.

Fix:
When there is a timeout event, the CLI disconnects from handler and is not able to connect with handler again to perform subsequent actions.
A fix has been implemented to reconnect successfully in case of a timeout event. This prevents application communication failure error. You might still see a timeout when the system is busy but you will still be able to perform required actions a few minutes/seconds later.


1355277-2 : Incorrect Vlan Listeners when a Static FDB is configured

Links to More Info: BT1355277

Component: F5OS-A

Symptoms:
When a Static FDB is configured on an interface, Vlan Listeners associated with that interface will have an extra Service ID configured for Service ID 1.

Conditions:
A Static FDB is configured on an interface.

Impact:
Extra broadcast traffic will be generated on the system, which could affect performance.

Workaround:
N/A

Fix:
N/A


1355113-1 : VELOS software upgrade does not inform about KubeVirt component upgrade

Links to More Info: BT1355113

Component: F5OS-A

Symptoms:
During F5OS software upgrades with VELOS chassis systems, there is a lack of visibility into which individual software components will be updated before the upgrade. This can lead to tenant degradation. In particular, when upgrading system controllers, the upgrade may include an update to the KubeVirt Kubernetes Extension, which will disrupt tenant operations.

Conditions:
VELOS F5OS system controller software upgrades include an update to the KubeVirt Kubernetes Extension.

Impact:
The traffic of all tenants that have been deployed will be disrupted.

Workaround:
None

Fix:
During an F5OS software upgrade on VELOS chassis systems, it is important to consider that the traffic of deployed tenants may experience temporary interruptions until the upgrade is finished.


1354373-1 : WebUI malfunctions when navigating to HSM Details with inactive FIPS drivers

Links to More Info: BT1354373

Component: F5OS-A

Symptoms:
If the FIPS card is not initialized properly due to inactive FIPS drivers, navigating to certain pages will break the webUI.

Conditions:
When the FIPS card is not initialized properly due to inactive FIPS drivers, the "HSM Details" and "Add FIPS Partition" screens on the webUI break.

Impact:
A blank screen appears, and users are unable to see the left navigation bar to switch to other screens.

Workaround:
To work around this issue, remove the screen name from the URL, which will navigate the user to the dashboard screen.

Fix:
On a system where the FIPS card is not initialized properly, navigating to the "HSM Details" and "Add FIPS Partition" screens no longer results in a break.


1354341 : Changing a VLAN from trunked (tagged) to native (untagged) on a LAG in a single transaction can cause traffic outage

Links to More Info: BT1354341

Component: F5OS-A

Symptoms:
Traffic outage after changing a VLAN assigned to a LAG from Trunk to Native in a single commit.

Conditions:
Changing a VLAN assigned to a LAG from Trunk to Native in a single commit.

Impact:
Traffic outage.

Workaround:
First remove the Trunk VLAN from the LAG, then commit the change. Then add the Native VLAN to the LAG and commit the change.


1354329 : Unable to access tenant through console access.

Links to More Info: BT1354329

Component: F5OS-A

Symptoms:
Admin can create a user with 'tenant-console' as its primary role from the ConfD CLI. This may create tenant console access issues if a tenant gets created with the same name as the user. The 'tenant-console' role is only for tenant and a new user with 'tenant-console' role cannot be created.

Conditions:
Admin has created a user with the 'tenant-console' role and then created a tenant with the same name as the 'tenant-console' user.

Impact:
Console access to the tenant (with the same name as a user, which is created earlier with tenant-console role) won't be working.

Workaround:
None

Fix:
Added a warning to be displayed during user creation with the 'tenant-console' role from ConfD CLI.
Example:
appliance-1(config)# system aaa authentication users user test_1 config role tenant-console
appliance-1(config-user-test_1)# commit
Aborted: 'system aaa authentication users user test_1 config role': tenant-console role cant be assigned to users other than tenant users.


1354053 : Suppress LOP SEEPROM object did not find errors during re-licensing

Links to More Info: BT1354053

Component: F5OS-A

Symptoms:
During licensing, F5OS can request data from platform SEEPROM that has not been programmed into the SEEPROM. In such cases, platform-hal logs an error message:

“appliance-1 platform-hal[8]: priority="Err" msg="Action Error" index=0 message="LOP Result Error: SeepromObjectNotFound (0x11)".

Conditions:
During licensing, platform-hal requests un-programmed values. Therefore, an error message is logged in the platform log.

Impact:
These log messages are not harmful and do not impact the operation of the system.

Workaround:
None

Fix:
To suppress these messages, upgrade to a newer version of F5OS. Updated F5OS has these messages suppressed and no longer present in the logs.


1353161 : Snmpd daemon stuck in loop deleting and recreating 'system snmp communities community' entry after recreating and deleting SNMP config a few times

Links to More Info: BT1353161

Component: F5OS-A

Symptoms:
Snmpd daemon stuck in loop deleting and recreating 'system snmp communities community' entry after recreating and deleting SNMP config a few times.

Conditions:
1. Put an SNMP configuration, e.g.:

curl -sku admin:admin -H "content-type: application/yang-data+json" https://localhost/api/data/openconfig-system:system/f5-system-snmp:snmp -XPUT -d @put2.json

# jq -c . <put2.json
{"f5-system-snmp:snmp":{"targets":{"target":[{"name":"i10_2_108_100","config":{"name":"i10_2_108_100","community":"verynicecommunity","security-model":"v2c","ipv4":{"address":"10.2.108.100","port":162}}},{"name":"i10_2_108_101","config":{"name":"i10_2_108_101","community":"verynicecommunity","security-model":"v2c","ipv4":{"address":"10.2.108.101","port":162}}}]},"communities":{"community":[{"name":"verynicecommunity","config":{"name":"verynicecommunity","security-model":["v2c"]}}]},"engine-id":{"config":{"value":"mac"}}}}
#

2. Wait 10 seconds or so

3. Delete/clear the SNMP config, using one of the two methods:

a. curl -sku admin:admin -H "accept: application/yang-data+json" https://localhost/api/data/openconfig-system:system/f5-system-snmp:snmp -XDELETE
b. from the confd CLI in config mode:
no system snmp ; commit no-confirm

4. Wait 15 seconds, while monitoring /var/log/messages for repeating audit messages related to the SNMP config.

5. Repeat first three steps.

Impact:
High CPU and inconsistent state (SNMP community string comes and goes from 'show running-config system snmp' output while the user is watching it).

Workaround:
Restart snmpd container using docker command.

Fix:
We obsoleted old SNMP configuration commands.

Behavior Change:
In latest F5OS releases (from F50S-A-1.2.x and F5OS-C-1.6.x onwards) SNMP configuration commands have been simplified. For backward compatibility, the old style SNMP configuration works until F5OS 1.7.0 and keeping a confirmation warning in the CLI asking user to use new simplified snmp commands and the old style commands will be obsolete in future releases.

In latest release (from F50S-A-1.8.x and F50S-C-1.8.x), the old SNMP configuration commands are obsolete.


1353085 : Configure admin/operator roles in LDAP without uidNumber or gidNumber attributes

Links to More Info: BT1353085

Component: F5OS-A

Symptoms:
In previous versions of F5OS, when using LDAP for third-party authentication, having uidNumber and gidNumber LDAP attribute mappings was required. These attributes are common on unix systems and unix-based directories, but are optional in Windows environments. In Windows environments (For example, Active Directory), admin may be required to manually add uidNumber attributes to users, and gidNumber attributes to admin/operator groups.

Conditions:
Third-party LDAP authentication using Active Directory or other LDAP directory where uidNumber and gidNumber attributes are not provided by default.

Impact:
In the above conditions, administrators are required to add uidNumber attributes to users in the directory, and gidNumber attributes to admin/operator groups.

Workaround:
Create uidNumbmer/gidNumber attributes if not present in directory.

Fix:
A feature was added to map LDAP groups to F5OS roles using LDAP filter (group names) instead of numeric IDs. Additionally, code was added to use objectSid mapping instead of uidNumber/gidNumber to eliminate the need to create missing attributes in Active Directory environments.


1353001 : tcpdump service improvements

Links to More Info: K000139502, BT1353001


1352845 : Some internal log content may not appear in external log server

Links to More Info: BT1352845

Component: F5OS-A

Symptoms:
When a remote log server is configured, some internal log content may not appear in the logs on the remote server. Notable are logs related to audit login failures.

Conditions:
Remote logging server is configured. Log messages do not appear on remote server for user trying to log in with wrong password repeatedly, causing account lockout.

Impact:
Brute-force password attack indications may not be seen on external log server.

Workaround:
For logs of this type, consult the log files directly on the appliance.


1352449 : iHealth upload is failing with error "certificate signed by unknown authority"

Links to More Info: BT1352449

Component: F5OS-A

Symptoms:
When attempting to use the QKView upload feature, the upload may fail with the message "certificate signed by unknown authority". This is due to a recent change in certificate authority that is inconsistent between F5OS and iHealth.

Conditions:
Always, after mid-September 2023.

Impact:
Unable to upload QKView files to iHealth with a single click.

Workaround:
Users may use the File Export feature to download QKView files to their PCs, and then upload those files to iHealth.

You can find the qkview files in the GUI at System Settings :: File Utilities, then choose "diags/shared" as the base directory, then select "qkview".

Fix:
Certificate authorities used by the iHealth upload feature in F5OS will be updated.


1352421 : L2 services (LACP/LLDP) are down on r2000 and r4000 series appliances

Links to More Info: BT1352421

Component: F5OS-A

Symptoms:
LLDP and LACP will appear to be non-functional on the F5OS system.

LLDP/LACP PDUs reach the F5OS system, which can be verified with tcpdump.

Conditions:
-- r2000 and r4000 series appliances.
-- LLDP or LACP is configured.
-- Links are up.

Impact:
L2 protocols fail to negotiate or register inbound data.

Workaround:
Reboot.


1352353-3 : Remove integrity-check configurable option from CLI

Links to More Info: BT1352353

Component: F5OS-A

Symptoms:
In F5OS systems, root and admin users are allowed to toggle the integrity-check option from the CLI. When in FIPS mode, integrity-check should always execute on system startup and when demanded. Since the integrity-check option is configurable, users can disable it which puts the integrity of the system at risk.

Conditions:
The configurable integrity-check option is visible when the device is in FIPS mode.

Impact:
An admin or root user could access the CLI and disable integrity-check. This could replace files and packages which could impact the integrity of the system.

Workaround:
N/A

Fix:
We have removed the enable/disable integrity-check option from the CLI.


1352045 : Not able to connect to tenant console via virtctl after upgrade

Links to More Info: BT1352045

Component: F5OS-A

Symptoms:
Unable to connect to tenant console via virtctl after upgrading from an older version to 1.7.0. It will happen only if any virtctl console is active while doing upgrade. After upgrading, there will be stale kubectl process with older certificates present which will cause errors.

Conditions:
Virtctl console is active for tenant at the same time live upgrade is initiated.

Impact:
Not able to connect console to any tenant after upgrade to 1.7.0.

Workaround:
Kill kubectl process manually.

Fix:
User is able to connect to the tenant console via virtctl after upgrading.


1351981 : QAT count is not dynamically updated for active tenants after license upgrade

Links to More Info: BT1351981

Component: F5OS-A

Symptoms:
The QAT count of BIG-IP Next tenants does not change for active tenants after license upgrade.
The QAT count does not match the expected value for the particular license.

Conditions:
The issue is seen only for BIG-IP Next tenants that are deployed with the old license.

Impact:
Incorrect QAT count for active (old) BIG-IP Next tenants.
No impact on new tenants after license upgrade.
No impact on BIG-IP tenants.

Workaround:
Deployed BIG-IP Next tenants need to be moved to configured and back to deployed for the right QAT value to be updated.

Fix:
N/A


1351893-2 : ConfD Logging 'Failed to change working directory' Error Message

Links to More Info: BT1351893

Component: F5OS-A

Symptoms:
When running the tcpdump client from the ConfD command line interface, ConfD logs 'failed to change working directory /var/roothome' error message in the devel.log file.

Conditions:
Running tcpdump client from the ConfD CLI.

Impact:
No known impact.

Workaround:
No work around.

Fix:
When ConfD executes external commands, the working directory is set to the user home directory by default. ConfD logs error if unable to find the user's home directory.


1351541-4 : Unable to remove the ISO images that share the same minor version with the running version

Links to More Info: BT1351541

Component: F5OS-A

Symptoms:
Removal of ISO (controller/partition/appliance) fails when a same minor version is shared.

Example: Import 1.5.1 and upgraded the system to 1.6.1. Later import 1.6.2(1.6.*) and upgraded the system to 1.6.2. When the system is on 1.6.2 unable to delete 1.6.1.

Conditions:
The major and minor version of the current ISO must be same as the ISO version that is being removed/deleted.

Impact:
Unable to remove the unused ISO.

Workaround:
For controller/appliance, you must remove the ISO on a software version that includes different minor release. For example, you can remove 1.6.1-5555 while running ISO version 1.5.X or 1.7.X.
 
For partition, disable and unset the ISO versions of any partitions that use the same minor version of the ISO that needs to be removed. For example, you can remove 1.6.1-5555 by disabling all the partitions running on 1.6.X and de-configure the SW versions.


1351529 : Fixing the log issue stating "UNSUPPORTED STP state" when STP global is configured

Links to More Info: BT1351529

Component: F5OS-A

Symptoms:
A log message appears, stating "UNSUPPORTED STP state" when STP global is configured to RSTP.

Conditions:
Removing the global config (initially set to STP) and setting it to RSTP.

Impact:
Reliable and correct log messages.

Workaround:
NA


1349977 : Setup wizards fails and immediately exits if it is given incorrect credentials.

Links to More Info: BT1349977

Component: F5OS-A

Symptoms:
If incorrect credentials are entered while using the setup wizard tool, it fails and exits immediately without allowing the user to correct the given credentials.
The setup wizard utility should make it clear that only non-root admin accounts can be used.

Conditions:
Incorrect credentials are passed to the setup wizard tool.

Impact:
User is not given the chance to correct incorrect credentials.


1349953 : Setup wizard script gives an "All IP addresses must be unique" error when NTP and DNS servers match

Links to More Info: BT1349953

Component: F5OS-A

Symptoms:
When the given IP addresses of NTP and DNS servers match, the setup wizard script gives the error, "All IP addresses must be unique" even though it is a valid configuration.

Conditions:
The IP addresses of NTP and DNS servers given to the Setup wizard tool are the same.

Impact:
Through the setup wizard tool, the user is not able to provide the same IP address for NTP and DNS servers, which is a valid configuration.

Workaround:
The same IP address for NTP and DNS servers can be configured using the webUI or CLI instead of the setup wizard tool.


1349001 : F5OS VELOS is polled as Unix device by SNMP using BMC Discovery

Links to More Info: BT1349001

Component: F5OS-A

Symptoms:
Hostname polling via SNMP interface is not available.

Conditions:
Using SNMP

Impact:
You are unable to see the hostname using SNMP interface.

Workaround:
None

Fix:
User can get hostname via SNMP interface using below oid:

SNMPv2-MIB::sysName.0


1348989 : GUI virtual server CLI has different limitations for days-valid

Links to More Info: BT1348989

Component: F5OS-A

Symptoms:
The range of acceptable values for days-valid for a certificate had inconsistent range limits between the GUI and CLI.

Conditions:
Creating a self-signed certificate.

Impact:
Possible to enter a value that cannot be reflected in both the GUI and CLI.

Workaround:
Limit the number of days-valid to the smaller of the two limits (65535).

Fix:
Both the CLI and the GUI now have the same range limits.


1348509 : Incorrect file path reported in the telemetry log records

Links to More Info: BT1348509

Component: F5OS-A

Symptoms:
Incorrect file path reported in the telemetry log records.

Conditions:
N/A

Impact:
The log file data being collected for telemetry is:
/var/F5/system/log/platform.log.

However, the file location value in the telemetry log records is shown as /var/F5/partition/log/platform.log.

Workaround:
N/A

Fix:
N/A


1348297-3 : CVE-2020-15113, CVE-2020-15114, CVE-2020-15115 - etcd Vulnerabilities

Component: F5OS-A

Symptoms:
CVE-2020-15113: A flaw was found in etcd where Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.

CVE-2020-15114: A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.

CVE-2020-15115: A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users' passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.

Conditions:
NA

Impact:
May lead to unauthorized system access, bypass of security mechanisms, or denial of service.

Workaround:
NA

Fix:
Removed unused etcd packages from F5OS


1348197-9 : CVE-2016-2779 util-linux: runuser tty hijack via TIOCSTI ioctl

Component: F5OS-A

Symptoms:
The runuser utility allows an executed program to inject characters into its controlling TTY input buffer using the TIOCSTI ioctl. This may result in unintended commands being entered into the parent shell after runuser exits.

Conditions:
NA

Impact:
command execution or privilege escalation.

Workaround:
N/A

Fix:
Fixed


1348189-3 : CVE-2020-13790 libjpeg-turbo: heap-based buffer over-read in get_rgb_row() in rdppm.c

Component: F5OS-A

Symptoms:
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.

Conditions:
N/A

Impact:
It can cause heap buffer over-read leading to crashes, denial of service, or potential information disclosure

Workaround:
N/A

Fix:
heap buffer over-read has been resolved


1348165-9 : CVE-2019-9893 in libseccomp is not applicable to this product release

Component: F5OS-A

Symptoms:
libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.

Conditions:
libseccomp before 2.4.0

Impact:
lead to bypassing seccomp filters and potential privilege escalations.

Workaround:
NA

Fix:
Applied patch and the issue is fixed


1348157-9 : CVE-2018-6003 libtasn1: Stack exhaustion due to indefinite recursion during BER decoding

Component: F5OS-A

Symptoms:
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.

Conditions:
N/A

Impact:
Resources including CPU, memory, and stack memory could be rapidly consumed or exhausted, eventually leading to an exit or crash and may also leak sensitive data through reporting error outputs.

Workaround:
N/A

Fix:
Fixed


1348145 : Observing 'Failed to send restarting msg to VF' during reboot with tenants deployed causing reboot time to increase

Links to More Info: BT1348145

Component: F5OS-A

Symptoms:
While rebooting with tenants deployed, the reboot time increased by 2-3 minutes. A "Failed to send restarting msg to VF" message also appears.

Conditions:
Occurs when rebooting a system where tenants are deployed.

Impact:
No functional impact.

Workaround:
N/A

Fix:
Rebooting time is no longer negatively impacted by tenants being deployed.


1348093 : Appliance-setup-wizard traceback on invalid NTP input

Links to More Info: BT1348093

Component: F5OS-A

Symptoms:
Appliance setup wizards throw an uncaught Python traceback if you enter non-numeric input for the NTP port

[root@appliance-1 ~]# appliance-setup-wizard
Traceback (most recent call last):
  File "/usr/bin/appliance-setup-wizard", line 1355, in <module>
    curses.wrapper(main)
  File "/usr/lib64/python2.7/curses/wrapper.py", line 43, in wrapper
    return func(stdscr, *args, **kwds)
  File "/usr/bin/appliance-setup-wizard", line 1329, in main
    if scene.setting.is_valid(input_string) is not True:
  File "/usr/bin/appliance-setup-wizard", line 282, in is_valid_ntp_port
    int(input_string) < MIN_NTP_PORT or
ValueError: invalid literal for int() with base 10: 'abc'

Conditions:
Giving non-numeric value as NTP port configuring via wizard-setup

Impact:
Throws an uncaught Python traceback.

Workaround:
None

Fix:
Fixed in F5OS-A 1.8.0


1347625-10 : libpng: underflow read in png_check_keyword()

Links to More Info: K000141359


1346873-3 : Timezone configuration logs "Timezone is invalid" warning

Links to More Info: BT1346873

Component: F5OS-A

Symptoms:
The system log a warning 'Timezone is invalid' when the timezone is configured.

Ex:
2023-08-14T03:50:38.263725-04:00 appliance-1 platform-mgr[17]: priority="Warn" version=1.0 msgid=0x104000000000043 msg="Timezone is invalid" ZONE="America/Los_Angeles".

Conditions:
When the system timezone is changed.

Impact:
No known functional impact, timezone is updating on the system.

Workaround:
None


1346833-6 : CVE-2017-0553 libnl: Integer overflow in nlmsg_reserve()

Component: F5OS-A

Symptoms:
An integer overflow leading to a heap-buffer overflow was found in the libnl library. An attacker could use this flaw to cause an application compiled with libnl to crash or possibly execute arbitrary code in the context of the user running such an application.

Conditions:
NA

Impact:
Crash or possibly execute arbitrary code in the context of the user running such application.

Workaround:
RHEL 8 is not affected. Images using RHEL 7 are patched. Upgrade to latest F5OS

Fix:
Fixed


1346821-9 : CVE-2020-13987: Open-iSCSI: OOB read in checksum calculation in uIP

Component: F5OS-A

Symptoms:
A out of bound read was found in uIP (Micro IP) TCP/UDP checksum calculation in IPv4
The function that parses incoming transport layer packets (TCP/UDP) does not check the length fields of packet headers against the data available in the packets. Given arbitrary lengths, an out-of-bounds memory read may be performed during the checksum computation.

Conditions:
N/A

Impact:
Out-of-bounds memory during checksum calculation, causing denial of service and potential information leakage.

Workaround:
N/A

Fix:
Fixed


1346797-9 : CVE-2019-15165 libpcap: Resource exhaustion during PHB header length validation

Component: F5OS-A

Symptoms:
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory which could lead to resource exhaustion during PHB header length validation

Conditions:
Using Wireshark or tcpdump for debugging.

Impact:
A Low Impact of Availability

Workaround:
NA

Fix:
patch applied.


1346513-8 : CVE-2017-7500, CVE-2017-7501 rpm: Following symlinks to directories/files when installing packages allows privilege escalation

Links to More Info: K03710547


1346489-8 : CVE-2017-14502, CVE-2020-21674: libarchive: Off-by-one error in the read_header function and DOS with heap-based buffer overflow in lib archive-3.4.1dev

Component: F5OS-A

Symptoms:
ead_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.

Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.

Conditions:
NA

Impact:
This only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.

Workaround:
NA

Fix:
patch applied.


1346465-8 : CVE-2019-20387 libsolv: out-of-bounds read in repodata_schema2id in repodata.c

Component: F5OS-A

Symptoms:
An out‑of‑bounds read was discovered in libsolv when processing schema data where the last schema length is shorter than the input schema length.

Conditions:
If libsolv is used to read package repository information.

Impact:
Out‑of‑bounds read, potentially causing the application that uses libsolv to crash (denial of service).

Workaround:
N/A

Fix:
Fixed


1341909 : Command 'show component' does not show psu-power-in and psu-power-out in CLI and API

Component: F5OS-A

Symptoms:
The command does not show psu-power-in and psu-power-out in CLI and API.

Conditions:
Running show components component <psu> in confd

Impact:
PSU power details are not retrieved using ‘show component' command.

Workaround:
PSU power details can be retrieved through the following HAL APIs:

docker exec -it platform-hal psf run GET:lop/object/sensor-psu-power-in

docker exec -it platform-hal psf run GET:lop/object/sensor-psu-power-out

Fix:
The ‘show component’ command shows psu-power-in and psu-power-out in CLI and API.


1341869-1 : Failed to delete tenant pods

Links to More Info: BT1341869

Component: F5OS-A

Symptoms:
Stale tenant pods will persist in Kubernetes.

kubectl get pods will list the tenant pods, although tenants are deleted.

Conditions:
When user deploys 10 to 15 tenants and deletes all of them at the same time.

Impact:
Deleted tenant resources will still be running in Kubernetes and consuming resources.

Workaround:
Create a tenant with the same name and delete.

Fix:
N/A


1341701-4 : Unable to launch tenant, as VF interface is getting incorrect name while attaching to tenant.

Links to More Info: BT1341701

Component: F5OS-A

Symptoms:
On r2x00/r4x00 related systems, tenant launch fails with an error in ConfD tenant status leaf:

"[default/virt-launcher-bip1-1-9sblf:sriov-net3-bip1]: error adding container to network "sriov-net3-bip1": failed to set up pod interface "net7" from the device "x557_4": failed to set netlink MAC address to 00:94:a1:db:bd:0c: resource temporarily unavailable"

Linux network manager udev rules and sriov cni try to
access the VF and change the interface name of VF. During this process, VFs fail and unable to retrieve. Thus, resource temporarily unavailable error occurs.

Conditions:
On r4x00 or r2x00 based systems:

1. In kubectl get pods -A output, the tenant pod goes into Init:0/1 state.
default virt-launcher-bip1-1-t6rkh 0/1 Init:0/1 0 36s
2. And in kubectl events, "resource temporarily unavailable" occurs on one of the VFs.
3. In /sys/class/net folder unable to see the below VF interfaces. Instead, some interfaces point to ensp* names which are wrong.

Actual result should be as follows:
[root@appliance-1 ~]# ls /sys/class/net
apigw-dummy-1 lcd sfp_7 sfp_p6v0503 veth0c09f23b veth6cec172f vethea3619d5 x557_p1v1100 x557_p3v1902
br_appliancenet lcd-intf sfp_8 sfp_p7v0900 veth2765115 veth80370796 vetheccdd5fb x557_p1v1101 x557_p3v1903
cni0 lo sfp_p5v0100 sfp_p7v0901 veth3f32fd86 veth82a8440b vethf4081a48 x557_p1v1103 x557_p4v1d00
default-intf mgmt sfp_p5v0101 sfp_p7v0903 veth4ab82fc6 veth8cda0b4d x557_1 x557_p2v1500 x557_p4v1d01
docker0 mgmt0-system sfp_p5v0102 sfp_p8v0d01 veth50d18b0 veth9e8b2e8c x557_2 x557_p2v1502 x557_p4v1d02
dummy0 sfp_5 sfp_p6v0500 sfp_p8v0d02 veth5fe12ffd vethac6590f8 x557_3 x557_p2v1503
flannel.1 sfp_6 sfp_p6v0502 sfp_p8v0d03 veth64783052 vethb688f03e x557_4 x557_p3v1901

Impact:
Tenant launch is unsuccessful and unable to connect to the tenant console or tenants' management connection.

Workaround:
1. Move tenants to configured state

2. Remove ice, iavf drivers using the following commands,
a. "rmmod /lib/modules/3.10.0-1160.71.1.F5.el7_8.x86_64/updates/drivers/net/ethernet/intel/ice/ice.ko"

b. "rmmod /lib/modules/3.10.0-1160.71.1.F5.el7_8.x86_64/updates/drivers/net/ethernet/intel/iavf/iavf.ko"

4. Load ice and iavf drivers using the following commands
a. "insmod /lib/modules/3.10.0-1160.71.1.F5.1.el7_8.x86_64/updates/drivers/net/ethernet/intel/ice/ice.ko"

b. "insmod /lib/modules/3.10.0-1160.71.1.F5.1.el7_8.x86_64/updates/drivers/net/ethernet/intel/iavf/iavf.ko"

5. Run config_ice_vfs.sh script present in /usr/omd/scripts/ folder using - "sh /usr/omd/scripts/config_ice_vfs.sh"

6. Wait until script is completed and VFs are created correctly.

6. Move tenants to running state and check the running state of tenant, after some time.


1341521 : Incorrect subnet mask returned for GET call for /systems

Links to More Info: BT1341521

Component: F5OS-A

Symptoms:
Subnet mask returned from Get call for /systems returns the wrong netmask for the management IP on VELOS and rSeries.

Conditions:
BIG-IP Next instances on VELOS and rSeries.

Impact:
Does not impact any functionality. GET API call for /systems returns the wrong subnet mask for the management IP.

Workaround:
Log in to the machine/tenant and check the management IP address by using the ip addr show command.

Fix:
N/A


1341493-2 : OpenShift cluster failure due to disk exhaustion from oversized log file's

Component: F5OS-A

Symptoms:
When log files in system grown several gigabytes(GB) and exhaust the disk space, resulting in OpenShift cluster failures.

Conditions:
When log rotation is configured on a daily basis and a log flood occurs in the system.

Impact:
The log file size can increase by several gigabytes during a flood event, potentially exhausting available disk space.

Workaround:
None.

Fix:
The log rotation job configured to run hourly instead of daily to prevent log files from growing excessively large. This will ensure timely rotation and manage file sizes more effectively.


1338601-1 : Tenant goes to INOPERATIVE state after rSeries reboot

Links to More Info: BT1338601

Component: F5OS-A

Symptoms:
- Tenant state shows running ConfD.
- Tenant management IP is not reachable.
- Inside tenant VM, prompt shows INOPERATIVE.

Conditions:
-- Large number of tenants (>36) on r12000 system.
-- The system is rebooted

Impact:
Tenant goes to INOPERATIVE state.

Workaround:
Move the tenant to configured and then deployed state.

Fix:
Fixed an issue preventing BIG-IP tenants from becoming active.


1338521 : Unable to login when accessing F5OS GUI through a network proxy on a port other than 443.

Links to More Info: BT1338521

Component: F5OS-A

Symptoms:
Users are not able to log in to the UI when trying to access F5OS GUI through a network proxy running on a port other than 443.

Conditions:
GUI should be accessed via a network proxy running on a port other than 443.

Impact:
Users are not able to log in to the GUI.

Workaround:
None

Fix:
After the fix, GUI now reads the port along with the hostname from the URL and can use the port in making API calls (including login API calls).


1338505 : Qkview is not collecting log data from kubernetes pods

Links to More Info: BT1338505

Component: F5OS-A

Symptoms:
Qkview does not collect log data from kubernetes pods found on an F5OS Appliance

Conditions:
-- F5OS-A
-- Qkview

Impact:
Limited ability to diagnose kubernetes pod issues

Workaround:
Collect log files for kubernetes pods manually.

Use the command:
kubectl logs <pod-name>

Fix:
Qkview will now collect kubernetes pod logs.


1332997 : Device stuck at "unmounting containers" after performing reboot

Links to More Info: BT1332997

Component: F5OS-A

Symptoms:
When we open the console session of any tenant on F5OS-A using virtctl console <tenant_name>.

when you reboot the system, during reboot sometimes the system might end up in "unmounting containers"

Conditions:
Open the console session to any of the tenants using virtctl utility and reboot the system.

Impact:
After rebooting, system takes time to fully start up.

Workaround:
Power off and on the system whenever the issue is hit.

Fix:
Fixed the issue related to device stuck at unmounting containers after the reboot.


1332781 : A remote user with the same username as the local F5OS user will be granted the local user's roles

Links to More Info: BT1332781

Component: F5OS-A

Symptoms:
If you create a remote user on the RADIUS, TACACS+, or LDAP servers with the same username as a local F5OS user, the remote user will be granted the local user's roles upon authentication.

Conditions:
A remote user is created with the same username as a local user and remote authentication is enabled.

Impact:
Remote user will take the local user's privileges.

Workaround:
Do not create a remote user with the same username as the local user. If you have created already, change the username for either the local user or the remote user.

Fix:
If a remote user is created with the same username as a local user, the remote user's authentication will be rejected. Only the local user will have access to the F5OS system.


1332293 : Tcpdump performed with an interface filter on VELOS or rSeries will show broadcast traffic from all interfaces

Links to More Info: BT1332293

Component: F5OS-A

Symptoms:
When performing a tcpdump in VELOS or an rSeries appliance, a traffic capture limited to a specific interface will show broadcast traffic hitting other interfaces.

Conditions:
- VELOS platform or r5000 / r10000 / r12000 series appliance
- Running a packet capture on a specific interface (e.g. 1/1.0 or 1.0)

Impact:
This can cause confusion or impede troubleshooting when unexpected broadcast traffic is seen in a capture such as ARP or Miscabling Protocol traffic.

Workaround:
None

Fix:
This issue is now corrected.


1330429 : Port Mappings screen on webUI displays "GB" for bandwidth instead of "Gb"

Links to More Info: BT1330429

Component: F5OS-A

Symptoms:
When a user navigates to the "Port Mappings" screen on the webUI, Capacity Bandwidth and Allocated Bandwidth incorrectly display "GB" as the units. It should be "Gb" [gigabit].

Conditions:
Going to the "Port Mappings" screen on the webUI.

Impact:
This does not affect the functionality. Capacity Bandwidth and Allocated Bandwidth values are correct except for the units.

Workaround:
N/A

Fix:
The "Port Mappings" screen now displays appropriate units for Capacity Bandwidth and Allocated Bandwidth, correcting the representation to "Gb."


1329797 : RADIUS user logs in through the WebUI without configuring the F5-F5OS-UID, will be disconnected after 10 minutes

Links to More Info: BT1329797

Component: F5OS-A

Symptoms:
When a RADIUS user is configured without F5-F5OS-UID and then logged in through the WebUI, they will be disconnected after 10 minutes. This problem has also been observed with other remote authentication methods where the UID and GID are configured.

Conditions:
1) Create a RADIUS user without F5-F5OS-UID configured
2) Logged in as the RADIUS user through WebUI

Impact:
If logged in as the RADIUS user through the WebUI, they will be disconnected after 10 minutes. This problem has also been observed with other remote authentication methods where the UID and GID are configured.

Workaround:
To avoid encountering this problem, the F5-F5OS-UID should be provided. Additionally, the UID for every user (which spans across all remote users as well as local users) should be unique (or have the same GID).

Fix:
UID is not defaulting to 1001 for RADIUS and TACACS+ users anymore. UID is assigned from the range 40,000 - 65,000 for remote users.


1329449-1 : Missing days-valid, store, and key type logging items of a certificate

Links to More Info: BT1329449

Component: F5OS-A

Symptoms:
Logging most of the certificate request fields but not logging days-valid, store, and key type fields. This was because some fields were added for the creation of the certificate and the logging was done as part of the certificate request.

Conditions:
Always

Impact:
The user will still see logging of all items used in the creation of a self-signed certificate, except for a few that are not necessary for the certificate request.

Workaround:
Check the history and observe the values that were entered.

Fix:
The key type and days-valid will now be logged. The store-tls is a logic value and not loggged.


1329021-2 : Display order of interfaces/portgroups in ConfD CLI are not in numerical order

Links to More Info: BT1329021

Component: F5OS-A

Symptoms:
Interfaces/portgroups are not listed in numerical order when viewing from the ConfD CLI.

Conditions:
Occurs when running the following commands on the ConfD CLI:

show interfaces interface state oper-status

show running-config portgroups portgroup

Impact:
Affects readability.

Workaround:
N/A

Fix:
Interfaces/portgroups are now listed in numerical order when displayed from the CLI.


1328921-1 : Tenants on rSeries system will not deploy, stuck in "Starting" state, with status "Not ready: containers with unready status: [compute]"

Links to More Info: K000137633, BT1328921

Component: F5OS-A

Symptoms:
Tenants fail to start.

- F5OS reports the tenant status as "Starting"
- F5OS reports the tenant instance status as "Not ready: containers with unready status: [compute]"

Conditions:
- rSeries appliance
- DNS search domain for system is configured with an uppercase letter in a domain, e.g.:

r5900# show system dns state search
system dns state search [ Example.com ]

Impact:
Tenants will not start.

Workaround:
Modify the DNS search domain list so that all entries contain only lowercase letters.

On an r2000 or r4000 series appliance, reboot the system.

On an r5000 or r10000 series appliance, either reboot the system or set the tenant to a "provisioned" state and then back to "deployed".


1328405 : F5OS system stopped generating tmstat snapshots

Links to More Info: BT1328405

Component: F5OS-A

Symptoms:
The F5OS system is not generating the tmstat snapshots, which helps us in diagnosing issues.

Conditions:
System is running an affected version of F5OS software (F5OS-A 1.2.0 and above, or F5OS-C 1.6.0 and above).

Impact:
Impacts the supportability of the device; the support teams usually rely on the snapshots while working on field issues.


1327689 : Manually remove root and user keys before entering Appliance Mode

Links to More Info: K000140574, BT1327689


1327137 : Interfaces take longer than expected to come up

Links to More Info: K000138753, BT1327137

Component: F5OS-A

Symptoms:
-- Interfaces take longer than expected to be marked UP (40+ seconds)
-- LACP status remains down until the interfaces are marked UP

Conditions:
-- rSeries appliance
-- F5OS-A
-- 100G interfaces

Impact:
For SFP/QSFP interfaces:
-- 25G/10G interfaces take over 10 seconds to be marked UP
-- 100G interfaces take 30+ seconds to be marked UP.

Workaround:
None


1327037-11 : openssh insecure client negotiation CVE-2020-14145

Links to More Info: K48050136


1326125 : RADIUS authentication fails if F5-F5OS-HOMEDIR attribute is not specified

Links to More Info: BT1326125

Component: F5OS-A

Symptoms:
Authenticating F5OS users against an external RADIUS server fails if the server does not specify an F5-F5OS-HOMEDIR attribute.

The F5-F5OS-HOMEDIR attribute is supposed to be optional.

Conditions:
F5OS system authenticating against a RADIUS server

Impact:
F5OS authentication fails even if the server sends back the required F5-F5OS-GID attribute.

Workaround:
Configure the RADIUS server to include an F5-F5OS-HOMEDIR attribute with a value of "/tmp"


1325893 : A vqfdm system software core file is occasionally observed on system reboot

Links to More Info: BT1325893

Component: F5OS-A

Symptoms:
The line-dma-agent or vqf-dm occasionally hits a cosmetic failure state as the entire system is rebooting, leading to a core file being produced prior to shutdown. There is no problem with the state of the system.

Conditions:
Due to left over data on a communication buffer from the tcpdump daemon to the line-dma-agent, on live-upgrade reboot the line-dma-agent can segfault during its shutdown after the tcpdump daemon already has gone down.

Impact:
A core file is observed on the system after the system finishes rebooting. This will happen during an upgrade from a version that is affected by this bug. The core file can be ignored.

Workaround:
None

Fix:
The memory for the communication buffer between the line-dma-agent and the tcpdump daemon has been refactored so this is no longer a possibilty during shutdown. The only way this core care be seen now is if a system is live-upgrading from a version without the fix in the line-dma-agent to a new version with this fix, even then the core is completely cosmetic. Once the system is updated to a version with the fix the core will never be reproduce again on sequential upgrades/reboots.


1324269 : LCD "System - Power On" option may not be available immediately after system is powered off

Links to More Info: BT1324269

Component: F5OS-A

Symptoms:
The "System - Power On" option on the LCD may not be available immediately after the system is powered off.

It may take some time before the LCD recognizes the system has been powered off and provides access to the "Power On" option within the "System" menu.

Conditions:
System is powered off yet the "System - Power On" option is not available on the LCD.

Impact:
Power-on via the LCD will not be available until the LCD recognizes that the system is powered down and makes the "Power On" option available.

As an alternative, the system may be powered on via the AOM menu.

Workaround:
Use the AOM menu to power on the system instead of the LCD.

Fix:
Fixed in LCD UI v1.13.10 and later.


1324257 : 4600 does not boot up after a shutdown

Links to More Info: BT1324257

Component: F5OS-A

Symptoms:
Powering on the system does not take you back to the "System" menu

Conditions:
Powering on the system via the LCD UI

You may briefly see a "Please wait" message which quickly disappears, after which you see the Power On menu again.

Impact:
The rSeries LCD power control options are unreliable and do not give adequate information about the state of powering on

Workaround:
None

Fix:
"System" page options with confirmation pop-ups now (correctly) navigate back to the "System" page after confirming via the pop-ups.


1322921 : FEC configuration support for 25G interfaces on r2000/r4000

Links to More Info: BT1322921

Component: F5OS-A

Symptoms:
All previous releases of F5OS-A did not support manual FEC configuration.

Conditions:
The r2000/r4000 is using the 4x25G port-profile mode.

Impact:
Unable to manually configure forward error correction.

Workaround:
None

Fix:
This release adds support for manual FEC configuration for the 25G interfaces.


1322817 : BIND vulnerability CVE-2023-2828

Links to More Info: K000135312, BT1322817


1322685 : Tcpdump sessions are terminated when interfaces are enabled or disabled.

Links to More Info: BT1322685

Component: F5OS-A

Symptoms:
All tcpdump sessions terminates abruptly when an administrator enables or disables an interface on the system, even if the interface is not participating in the tcpdump session.

Conditions:
When an administrator enables or disables an interface on the system.

Impact:
All the current running tcpdump sessions are terminated and have to be restarted.

Workaround:
Do not make modifications to interfaces when the tcpdump sessions are active.

Fix:
None


1321429-6 : F5-PLATFORM-STATS-MIB::diskPercentageUsed not available.

Links to More Info: BT1321429

Component: F5OS-A

Symptoms:
The diskPercentageUsed OID is not available.

snmpwalks/getnext of diskUtilizationStatsTable will not return diskPercentageUsed.

snmpget of diskPercentageUsed will fail with a no Such instance error.

snmptable of F5-PLATFORM-STATS-MIB:diskUtilizationStatsTable shows a question mark (?) for diskPercentageUsed.

Conditions:
Snmpget of diskPercentageUsed

Impact:
The disk percentage used statistic is not available via SNMP.

Workaround:
None

Fix:
Support for disk percentage used statistic is added via SNMP.


1320637-2 : DMA Agent crash after SEP file mapping error

Links to More Info: BT1320637

Component: F5OS-A

Symptoms:
When DMA Agent is unable to map the SEP block for a newly deployed tenant it may crash during shutdown.

Conditions:
Insufficient resources to deploy the tenant.

Impact:
The crash occurs on shutdown, it has no impact.

Workaround:
None

Fix:
DMA Agent does not crash after a SEP mapping failure.


1316097-4 : LAGs not programmed when adding VLAN to LAG

Links to More Info: BT1316097

Component: F5OS-A

Symptoms:
Traffic from a LAG is not reaching the tenant.

Conditions:
1) Add a VLAN to a LAG and add that VLAN to a tenant in the same commit.

2) Configuration read following blade reboot.

Impact:
LAGs are not programmed; traffic doesn't reach tenant.

Workaround:
Workaround for condition (1): Add the VLAN to the LAG, commit; then add the VLAN to the tenant.

Fix:
Fix usage of mutexes to prevent deadlock with LAG programming is happening in parallel with VLAN programming.


1307577-2 : Add more resilience to the file download API

Links to More Info: BT1307577

Component: F5OS-A

Symptoms:
If basic authentication is being used in place of the x-auth-token, then the system blocks the requests and eventually stales in the request queue.

Conditions:
Use of basic authentication instead of the x-auth-token causes this situation in file download.

Impact:
No new download requests can be made.

Workaround:
Restart the platform-services.

Fix:
N/A


1307565-2 : The file download API is not working with the x-auth-token header

Links to More Info: BT1307565

Component: F5OS-A

Symptoms:
The x-auth-token in the header of the request is not working for file download.

Conditions:
Try to download a file using the file download API with the x-auth-token header.

Impact:
The file download fails when using the file download API with the x-auth-token header.

Workaround:
Pass x-auth-token as part of the form-data of the API instead of in the header.

Fix:
N/A


1306561-9 : CVE-2021-27218: glib2: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform

Component: F5OS-A

Symptoms:
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2^32, causing unintended length truncation.

Conditions:
NA

Impact:
Integer Overflow or Wraparound

Fix:
glib2 has been updated to a non-vulnerable version.


1306233 : Low mixed IPv4/IPv6 performance

Component: F5OS-A

Symptoms:
Mixed IPv4/IPv6 performance does not increase after changing the ‘PVA Offload Initial Priority’ (fastl4 profile) to ‘High’.

Conditions:
Mixed IPv4 and IPv6 traffic with ‘PVA Offload Initial Priority’ (fastl4 profile) set to ‘High’.

Impact:
Lower than expected performance of mixed IPv4 and IPv6 traffic.

Workaround:
None

Fix:
Lower the allowable rate of incoming broadcast/DLF packets.


1306201-11 : glibc CVEs CVE-2009-5155, CVE-2022-23218, CVE-2022-23219, CVE-2017-8804, CVE-2020-1752, CVE-2021-35942, CVE-2021-3999

Links to More Info: K49921213


1306113-11 : Multiple CVEs in SQLite package

Links to More Info: K000158050


1305005 : Error handling in F5OS file-download API

Links to More Info: BT1305005

Component: F5OS-A

Symptoms:
Upon file download failure, API is returning an Apache error page that isn't an F5OS-specific error and isn't aligned with other F5OS API errors. This is a negative user experience.

Conditions:
Due to unhandled errors, when data not in the FormData format are passed through a Curl request, an Apache error page is thrown, misaligning from other F5OS APIs errors.

Impact:
There is no functional impact. It is a negative user experience.

Workaround:
N/A

Fix:
All errors are handled in the file-download API and aligned with other F5OS APIs errors with no more Apache error pages in error cases.


1304921 : F5OS file download API does not work with basic authentication

Links to More Info: BT1304921

Component: F5OS-A

Symptoms:
File upload and download using basic auth is not supported.

Conditions:
When trying to upload or download the file from F5OS using basic auth.

Impact:
Upload/download failed with authentication error.

Workaround:
None

Fix:
File download API work with basic auth and x-auth-token.


1304765-3 : A remote LDAP user with an admin role is unable to make config changes through the F5 webUI

Links to More Info: BT1304765

Component: F5OS-A

Symptoms:
When a remote user's GID is mapped to the F5OS system's local GID, the GID mapping is not parsed correctly by the system. If the remote GID is known to the F5 system, there is no issue. For example, a mapping of the form 9000:9000 works fine. However, mapping of the form 5555:9000, 6666:9000 etc. will not work.

Conditions:
Local GID is being mapped to a remote GID.

Impact:
The admin user mapped to a remote GID cannot access the ConfD config mode.

Fix:
Update the system to the version with the fix.


1304085-1 : Unable to set local user's password if the same user exists on a remote LDAP server

Links to More Info: BT1304085

Component: F5OS-A

Symptoms:
If a user exists locally (in F5OS) as well as on a remote LDAP server, and LDAP-based authentication is configured as an accepted authentication method, attempting to set the user's local password in F5OS will fail. In the ConfD CLI, an error like the following will be observed:

syscon-1-active(config)# system aaa authentication users user ldap_user config set-password
Value for 'password' (<string>): ****************
Error: Rejected,
Configured password-policy:
min-length:6
required-differences:8
max-letter-repeat:3
policy applies to root:true

It should be emphasized that in the case of such duplicate user definitions locally/remotely, the local user's credentials will need to be used to login even if remote authentication is preferred.

Conditions:
A user exists locally (in F5OS) as well as on a remote LDAP server, and LDAP-based authentication is configured as an accepted authentication method.

Impact:
Unable to set the local user's password.

Workaround:
Temporarily remove LDAP as an authentication method, set the user's password, and then re-configure the preferred authentication method(s).

Fix:
Fixed issue with setting a local user's password when an identically named user exists on a remote LDAP server and LDAP is enabled as an authentication method


1303877-1 : INTEL-SA-00730: CVE-2022-33972

Links to More Info: K000134942, BT1303877


1301941-10 : CVE-2023-29491 ncurses: Local users can trigger security-relevant memory corruption via malformed data

Component: F5OS-A

Symptoms:
A vulnerability was found in ncurses and occurs when used by a setuid application. This flaw allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.

Conditions:
NA

Impact:
It results in memory corruption possibly leading to a crash/DoS or code execution.

Workaround:
N/A

Fix:
Fixed


1301321-1 : CVE-2022-38087: Intel BIOS vulnerability

Links to More Info: K000134744


1300749 : Syslog target files do not use the hostname configured via system user interface.

Links to More Info: K000135373, BT1300749

Component: F5OS-A

Symptoms:
Syslog target files, for example: /var/F5/system/log/platform.log, use a fixed nodename (appliance-1) for every device as a hostname.

Conditions:
Viewing syslog files, especially on a remote syslog server.

Impact:
In a remote log collector, source IPs are the only way to differentiate among devices.

Workaround:
It is possible to do an iRule workaround that replaces custom strings in syslog traffic depending on the client's IP address. This iRule is applied to the virtual server on another LTM that consumes the syslog traffic and load balances.


when CLIENT_DATA {
   switch [IP::client_addr] {
       "10.10.10.10" { UDP::payload replace 38 11 "ABCDC01F5OS01" }
       "10.10.10.20" { UDP::payload replace 38 11 "ABCDC01F5OS02" }
       }
}

Below is the example message after irule workaround.

Jul 31 03:33:50 10.10.10.10 2023-07-31T07:33:50.181136+00:00 appliance-1 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 0 (1:Enabled 2:Disabled ... )".

to this

Jul 31 06:00:01 10.10.10.10 2023-07-31T10:00:01.356324+00:00 ABCDC01F5OS01 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 1 (1:Enabled 2:Disabled ... )".
Jul 31 06:00:04 10.10.10.20 2023-07-31T10:00:04.983677+00:00 ABCDC01F5OS02 lacpd[1]: priority="Info" version=1.0 msgid=0x3401000000000046 msg="" info_str="check_if_op_modify(): new oc_if_enabled: 0 (1:Enabled 2:Disabled ... )".

Fix:
Infrastructure to use the system hostname user configuration in the syslog target logs has been added with the setting 'system logging config include-hostname'. It is enabled by default, and can be turned off if old behavior is preferred.


1297357-1 : WebUI authentication does not follow best practices in some situations

Component: F5OS-A

Symptoms:
Under certain circumstances, the WebUI interface and RestConf requests do not follow best practices when handling authentication-related requests.

Conditions:
Undisclosed.

Impact:
Undisclosed.

Workaround:
Secure access to the F5OS GUI and expose only to trusted users and networks.

Fix:
WebUI and RestConf requests now follow best practices.


1297349 : Tightening controls on uploading files to F5OS

Component: F5OS-A

Symptoms:
The File Upload Manager permits arbitrary file types to be uploaded by an admin user.

Conditions:
-- Uploading files
-- User role is admin

Impact:
Arbitrary file types can be uploaded.

Workaround:
Do not upload untrusted files to the F5OS system. Reduce access to the management plane to trusted users.

Fix:
Only .iso, .os, .img, and .patch files are permitted to be uploaded.


1296997 : Large core files can cause system instability

Links to More Info: BT1296997

Component: F5OS-A

Symptoms:
When a system generates and stores large core files, it can cause the system unstable.

Conditions:
F5OS generates a large core file.

Impact:
F5OS core-writing script does not check filesystem availability before writing a core file and can fill up the filesystem, causing catastrophic system instability until disk-space is reclaimed.

For more information of other impacts see
1185577 - F5OS-A memory leak in ImageAgent process on rSeries hosts may affect tenant performance or lead to unexpected restarts of tenant or host
https://cdn.f5.com/product/bugtracker/ID1185577.html

1284705 - Appliance Orchestration Manager core file may consume entire root filesystem
https://cdn.f5.com/product/bugtracker/ID1284705.html

1290949 - Invalid memory read in appliance orchestration manager
https://cdn.f5.com/product/bugtracker/ID1290949.html

1327701 - Space in SNMP community/user/target name causing snmpd container restart
https://cdn.f5.com/product/bugtracker/ID1327701.html

Workaround:
None

Fix:
F5OS now takes into account the available filesystem space before writing a core file. If the core file is too large then it will be truncated and deleted to maintain system stability. The system log message will indicate if the core file was too large to safely write.


1294561 : When OCSP is disabled, configurations are not accurately shown outside of 'config' mode

Links to More Info: BT1294561

Component: F5OS-A

Symptoms:
When the OCSP feature is disabled, making any changes to OCSP configurations (i.e. nonce request, override-responder) are not being updated outside of 'config' mode on the ConfD CLI. When the OCSP feature is enabled, there is no issue.

Conditions:
Occurs when OCSP is set to 'disabled' and changes are made to the OCSP configurations. Running 'show system aaa authentication ocsp' will display incorrect information.

Impact:
No functional impact. User will not be able to see an accurate display of the OCSP configurations while the feature is disabled.

Workaround:
N/A

Fix:
Starting in F5OS 1.8.0, OCSP configurations are accurately displayed even if the feature is disabled.


1293249 : AAA server group Port and Type are not displayed on ConfD

Links to More Info: BT1293249

Component: F5OS-A

Symptoms:
When a server group is created on an F5OS appliance, "show system aaa server-groups" does not display the Port and Type of the server group.

Conditions:
When a AAA server group is created (LDAP/RADIUS/TACACS).

Impact:
This is a cosmetic issue.

Port and Type information is not displayed on ConfD:

appliance-1# show system aaa server-groups
NAME TYPE ADDRESS PORT
-------------------------------------------
ldap-group - 10.50.5.25 -

Workaround:
The Port and Type information can be viewed via Web UI.


1292405-6 : CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64

Links to More Info: K000137702, BT1292405


1292297-11 : CVE-2021-20095 CVE-2021-42771 python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code

Component: F5OS-A

Symptoms:
A flaw was found in python-babel. A path traversal vulnerability was found in how locale data files are checked and loaded within python-babel, allowing a local attacker to trick an application that uses python-babel to load a file outside of the intended locale directory.

Conditions:
N/A

Impact:
Data confidentiality and integrity as well as service availability.

Workaround:
N/A

Fix:
Fixed


1291513 : Some log messages/timestamps do not observe configured timezone

Links to More Info: BT1291513

Component: F5OS-A

Symptoms:
Some logfiles and timestamps report the time as UTC even when the system is configured with a non-UTC timezone.

Conditions:
The orchestration-manager is not aware of the configured timezone, so Openshift/Kubernetes/Ansible log files produced by this component are reported as UTC. Also, the 'user login/last login' times reported by the CLI are always in UTC.

Impact:
Difficult to correlate timestamps across log files.

Workaround:
None

Fix:
Orchestration Manager recognizes the current timezone setting, and produces all timestamps as localtime using RFC3339 format (localtime + offset). All debug logfiles produced by this component are now timezone aware.

The sshd/login programs report login/last login times as localtime, not UTC. The CLI no longer (incorrectly) reports login time.


1289861 : Ability to suppress the proceed warning generated when portgroup mode is changed

Links to More Info: BT1289861

Component: F5OS-A

Symptoms:
When the user commits portgroup mode changes, the system generates a proceed warning to inform the user of the potential consequences.

Conditions:
When committing portgroup mode changes.

Impact:
While the proceed warning is present, the user needs to input “yes” or “no” before the transaction is committed.

Workaround:
None

Fix:
Now you have the option to suppress the proceed-warning for the entire system. The setting is called portgroup-confirmation-warning and can be disabled in confd with the following command:

system settings config portgroup-confirmation-warning off


1289481-12 : CVE-2021-3697, CVE-2021-3695, CVE-2022-28733, CVE-2022-28734: grub2

Links to More Info: K000132893


1288897-2 : Allowed IP rule name, which contains all underscores, will be deleted while upgrading to F5OS-A 1.7.0 and later versions

Links to More Info: BT1288897

Component: F5OS-A

Symptoms:
Customer are able to create an allowed-ip rule with a name containing all underscores, hyphens or dots, which is not readable.

Conditions:
Creating an allowed-ip rule with a name which contain only allowed special characters.

Impact:
Created allowed-ip rule, with a name containing only underscores, hyphens or dots, will be deleted during upgrade.

Workaround:
Customer must rename the allowed-ip rule name that contain all special characters with a name containing at least one alpha-numeric character before upgrading to F5OS-A 1.7.0 or later Versions.


1288765 : Provide ability to manage services through systemd/docker commands from F5OS CLI

Links to More Info: BT1288765

Component: F5OS-A

Symptoms:
You are unable to start/stop/check service status for systemd units or docker containers.

Conditions:
-- Confd CLI
-- You would like to check status of specific containers

Impact:
You are unable to check service status for specific containers.

Workaround:
None

Fix:
You can now start/stop/check service status for systemd services or docker containers:

system diagnostics os-utils docker [start|stop|restart] node platform service <name>


1287245-2 : DAGD component crashes during live upgrade or downgrade

Links to More Info: BT1287245

Component: F5OS-A

Symptoms:
The DAGD component crashes occasionally during live upgrade or downgrade. However, these incidents won't affect the overall system, and the DAGD component will restart automatically without requiring any user action.

Conditions:
The DAGD component crashes occur rarely during live upgrade or downgrade.

Impact:
There is no impact on the overall health of the system.

Workaround:
N/A

Fix:
N/A


1286153 : Error logs while generating the qkview

Links to More Info: BT1286153

Component: F5OS-A

Symptoms:
System logs following errors under platform.log while capturing qkview
---
2023-04-09T13:21:23.774606+00:00 appliance-1 tcam-manager[78]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="handle_dbg_cmd_snapshot: bad tcam id 2".
2023-04-09T13:21:32.905003+00:00 appliance-1 tcam-manager[78]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="handle_dbg_cmd_snapget: bad row id 512".
---

Conditions:
Generating a qkview

Impact:
The errors are false alarms, they don't have any functional impact.


1285997-6 : LLDP is allowed to configure on interfaces when virtual wire is enabled

Links to More Info: BT1285997

Component: F5OS-A

Symptoms:
LLDP is allowed to configure on interfaces although virtual wire is enabled.

Conditions:
1) Enable virtual wire on interface.
2) Attach interfaces to a lag.
3) Enabled LLDP on the interfaces.

Impact:
When virtual wire is enabled, BIG-IP will function in transparent mode and is not expected to see interfaces on either side.
With this issue, F5 interfaces will be visible when LLDP is enabled.

Workaround:
Do not configure LLDP on the interfaces when virtual wire is enabled.

Fix:
N/A


1284389 : Show system health reports unhealthy during bootup

Links to More Info: BT1284389

Component: F5OS-A

Symptoms:
In FIPS supported hardware, during the device boot-up, show system health report shows unhealthy due to fips-state reports -1 during boot-up.

Conditions:
-- during boot-up
-- FIPS partition not initialized

Impact:
No functionality impact, it's a cosmetic issue and reports unhealthy in confd and logging.

Workaround:
None

Fix:
While the device is booting, the fips state starts with -1 and it shows unhealthy till the device completely boots up, but actually, the -1 state is not initialized, so updated the code that, don't report the -1 state as unhealthy.


1282493-3 : Crypto devices are not released after tenants are deleted

Links to More Info: BT1282493

Component: F5OS-A

Symptoms:
Deleting the tenants does not release the crypto devices that were allocated to those tenants while creating them.

Conditions:
When a software upgrade was initiated incorrectly such as:
1. Upgrading only OS version
2. Upgrading only Service version

Impact:
Crypto devices behavior will be unexpected.

Workaround:
Always upgrade the software with ISO that contains the correct OS and services combination.

Fix:
None.


1282185-2 : Unable to restore backup file containing expired TLS certificate

Links to More Info: BT1282185

Component: F5OS-A

Symptoms:
If a user attempts to restore a configuration backup whose contents include a TLS certificate that has expired, the configuration restore will fail.

Conditions:
User attempts to restore a configuration backup file which contains an expired TLS certificate.

Impact:
User is unable to restore their backed up configuration.

Workaround:
While there is no workaround for the issue, once the backup has been collected, this can be avoided by de-configuring any TLS certificates before collecting a configuration backup, and re-setting them manually after the configuration backup has been restored.

Fix:
Fixed issue where configuration backup files containing expired TLS certificates could not be successfully used for configuration restore.


1277429-1 : Operational and Configurational prompts do not persist through user sessions

Links to More Info: BT1277429

Component: F5OS-A

Symptoms:
prompt1 (Operational) and prompt2 (Configurational) do not persist over user sessions and logins once configured.

Conditions:
Configure both prompts, exit from session and re-login. It can be observed that the configured prompts are reset to default.

Impact:
Hard to identify the terminal session without configured prompts when working with multiple terminal sessions with new logins.

Workaround:
None

Fix:
Operational (oper-prompt) and Configurational (config-prompt) prompts can be configured which persist over sessions and logins.


1270309 : Audit.log may log incorrect username initially for users logging into the CLI, remotely-authenticated users may see hostname in prompt reported as "appliance-1", and remotely-authenticated LDAP users may experience lengthy delays when authenticating

Links to More Info: BT1270309

Component: F5OS-A

Symptoms:
The audit log may initially show the incorrect username when users log in to the CLI:

For example:

msg="audit" user="[one username]/[number]" cmd="created new session via cli from 192.0.2.1:56166 with ssh".
msg="audit" user="[one username]/[number]" cmd="CLI 'show system state hostname'".
msg="audit" user="[one username]/[number]" cmd="CLI done".
msg="audit" user="[one username]/[number]" cmd="terminated session (reason: normal)".
msg="audit" user="[actual username]/[another number]" cmd="created new session via cli from 192.0.2.1:56166 with ssh".
msg="audit" user="[actual username]/[another number]" cmd="CLI 'exit'".
msg="audit" user="[actual username]/[another number]" cmd="terminated session (reason: normal)".


Or:

confd[121]: audit user: [tenant name]/[number] assigned to groups: admin
confd[121]: audit user: [tenant name]/[number] CLI done
confd[121]: audit user: [tenant name]/[number] terminated session (reason: normal)
confd[121]: audit user: test_user/[number] assigned to groups: admin


If role GID mapping is configured, remotely-authenticated users may see the hostname reported in the prompt as "appliance-1", rather than the correct hostname. For instance:

User f5osadmin last logged in 2023-10-01T01:02:03.123456+00:00, to appliance-1 from 192.0.2.1 using cli-ssh
f5osadmin connected from 192.0.2.1 using ssh on appliance-1.chassis.local
appliance-1#


Remotely-authenticated LDAP users may experience lengthy delays when authenticating via SSH, particularly if one or more of the following are true:
- the LDAP server has a large number of groups
- the LDAP server has many users in groups
- there is noticeable latency between the F5OS system and the LDAP server

Conditions:
When trying to use remote authentication, multiple user accounts have the same UID (user identifier). The user IDs may overlap between multiple remote users, or between remote users and local users.

Impact:
The audit.log will show an incorrect username for the first few entries.

The CLI prompt may display the generic hostname "appliance-1".

Workaround:
To avoid the audit.log reporting an incorrect username, ensure all user accounts have unique user IDs.

If that is not practical, or to work around the other symptoms of this issue, the following procedure will work around the issue; this procedure will be reverted by any software version changes.

1. Log into the rSeries appliance as root

2. Put the script below into /etc/cron.hourly, as a file named "ID1270309-workaround", and then mark it executable ("chmod 755 /etc/cron.hourly/ID1270309-workaround").

===
#!/bin/bash

set -Eeuo pipefail

# f5_confd_cli from different versions of F5OS-A
# 1.5.0 / 1.5.1
# 1.5.1 with the fix for ID1301837
MATCHING_CHECKSUM=( "5496b29958666ab7eeb44e1dbc78afb4c99a08d5" "a5d4a6928fb77fd089ed8289f1162220d30e2c8c" )
# The same file, with the patch below applied to it.
MODIFIED_CHECKSUM=( "37ab85644d33f1fdd1724e284aa694c897a4e898" "8d552eb9f79853dacf762d9ee21c06cc950383f3" )

FILE=/var/lib/controller/f5_confd_cli

CHECKSUM=$(sha1sum "$FILE" | awk '{print $1}')

if [[ "${MATCHING_CHECKSUM[@]}" = *"$CHECKSUM"* ]]; then
    :
elif [[ "${MODIFIED_CHECKSUM[@]}" = *"$CHECKSUM"* ]]; then
    # Already modified. Nothing to do
    exit 0
else
    echo >&2 "f5_confd_cli is in unknown state, not modifying."
    exit 0
fi

patch -p1 "$FILE" << 'EOF'
--- /var/lib/controller/f5_confd_cli.ID1270309.orig 2023-09-05 15:35:44.651749231 -0700
+++ /var/lib/controller/f5_confd_cli 2023-09-05 15:37:08.894286756 -0700
@@ -180,16 +180,11 @@
     echo "System Time: $date"
 fi
 
-# Read the hostname from /system/state/ if it exists,
-# otherwise default to the hostname
-hostname_cli_out=$(echo "show system state hostname" | /var/lib/controller/confd_cli -N)
-
-hname=${HOSTNAME}
-if [[ ! -z "${hostname_cli_out}" ]]; then
- if [[ "$hostname_cli_out" == *"system state hostname"* ]]; then
- hname=$(echo ${hostname_cli_out} | awk '{print $(NF)}')
- fi
+if [ -r /etc/f5_sys_hostname/env ]; then
+ . /etc/f5_sys_hostname/env
 fi
+hname=${SYS_CONFIG_HOSTNAME:-$HOSTNAME}
+
 if [[ -z "${supplementary_gids}" ]]
 then
     exec /var/lib/controller/confd_cli -C -H ${hname} -u ${USER} --gid "${primary_gid}"
EOF
===

This script will check and potentially update the login script once an hour to apply the workaround. After a system reboot or the system_manager docker container restarts, there is a potential period of up to an hour before the workaround is reapplied.

This workaround will also only function for specific versions of F5OS software; currently, only for F5OS-A 1.5.0 and F5OS-A 1.5.1.


1268433 : Some firewall rules do not generate denial logs

Links to More Info: BT1268433

Component: F5OS-A

Symptoms:
system_latest_vers network namespaces are disabled by default to prevent host kernel log flooding from inside a container.

Conditions:
By default, all network namespace logs are disabled except for init namespace.

Impact:
When traffic is denied from an IP, we do not get a message saying traffic from a particular IP is denied.

Workaround:
Command to enable system_latest_vers network namespace denial logs:
sysctl -w net.netfilter.nf_log_all_netns=1 (not-persistent)

Persistent solution:
1) Create a file: /etc/sysctl.conf

2) Run the command:
echo "net.netfilter.nf_log_all_netns = 1" >> /etc/sysctl.conf


1251989 : Changing the system Date/time back and forth using NTP server brings the system to abnormal state

Links to More Info: BT1251989

Component: F5OS-A

Symptoms:
Upon changing the system date following things can be observed in the appliance
1. K3S cluster pods go into an errored state.
2. Cannot bring up the tenant on the Cluster

Conditions:
Either by using an NTP server or by using CLI date/time can be changed.

Changing the date forward and moving back to the original date.

Impact:
The K3S cluster does not come UP properly and eventually it brings down the tenant

Workaround:
Workaround:

1. Identify the pods which are having certificate issues.
2. In the case of the K3S cluster and kubevirt pods, It can be recovered by deleting the pods.

Fix:
Check for pods in an errored state and delete using the following commands.

kubectl delete pod <name> -n <namespace> --force


1251957 : SNMP OIDs to monitor serial number of the device, type of hardware and hostname

Component: F5OS-A

Symptoms:
Device serial number, type, and hostname are not available for the SNMP interface.

Conditions:
Install the F5OS-A/F5OS-C version and run SnmpWalk.
You cannot find the device’s serial number, type, and hostname.

Impact:
You are not able to poll for device serial number, type, and hostname through the SNMP interface.

Workaround:
None

Fix:
Added support for device serial number, type, and hostname for SNMP interfaces.


1251161-2 : Authentication fails via the webUI when “:” is at the end or beginning of the password

Links to More Info: BT1251161

Component: F5OS-A

Symptoms:
After modifying the user's password to include ":" either at the beginning or the end of the password, the user is not able to log in via the webUI.

The user is able to log in via the CLI (SSH).

Conditions:
The password includes ":" at the beginning or end of the password string.

Impact:
User not able to log in via the webUI.

Workaround:
Do not use ":" at the beginning or end of the password string.

Since it is possible to log in via the CLI, modify the password accordingly.


1250925 : Alarm for AOM fault due to "LOP Runtime fault detected: lop:nc-si-rmii:failure"

Links to More Info: BT1250925

Component: F5OS-A

Symptoms:
The AOM may report a runtime fault after a failure to configure the NC-SI RMII interface. This results in a system alarm for "Fault detected in the AOM" and an event indicating that "LOP Runtime fault detected: lop:nc-si-rmii:failure".

Conditions:
The conditions causing the LOP runtime fault for NC-SI RMII interface configuration are not known.

Impact:
The AOM uses the NC-SI RMII interface to allow external SSH access directly to the AOM through the management interface. When the interface configuration fails, then the AOM is not accessible via SSH.

Workaround:
A reset of the AOM can correct this issue. Login to the system as root. Issue the following command to reset the AOM.

docker exec -ti platform-hal psf POST:lop/object/reset-device device=Aom
 
Wait approximately 10 minutes and check the AOM runtime status to verify the the "LOP Runtime fault detected: lop:nc-si-rmii:failure" condition has cleared.

docker exec -ti platform-hal psf GET:lop/object/health

For example, a healthy LOP with no runtime status faults will return "runtimeStatus" equal to zero as shown below.

[root@appliance-1 ~]# docker exec -ti platform-hal psf GET:lop/object/health
  field | value
-----------------------------+--------
  postBitDescriptionItems | []
  postStatus | 0
  runtimeBitDescriptionItems | []
  runtimeStatus | 0

Fix:
Fixed with AOM version 2.00.350.0.1 and later.


1250901-7 : On rSeries FIPS system live upgrade, cavium_n3fips (liquidsec_pf_vf driver) may fail to come into operational state

Links to More Info: BT1250901

Component: F5OS-A

Symptoms:
After a reboot of the system in live upgrade, tenants that were running earlier might not change to a running state. This is due to the HSM board driver stuck in SAFE_STATE instead of OPERATIONAL_STATE.

In some cases, the driver changes to an operational state after some amount of time (approximately 10 minutes). But this time might vary upon detection of reset/link failure in the hardware. In some other systems, the driver becomes stuck in SAFE_STATE indefinitely.

Conditions:
Live upgrade/reboot of the rSeries FIPS system with F5OS-A.

You may observe the below logs in dmesg-
[ 964.105021] liquidsec_pf_vf_driver 0000:ca:00.0: We might have a link issue... resetting
[ 964.113688] liquidsec_pf_vf_driver 0000:ca:00.0: RESETTING FIRMWARE... CAUTION

Impact:
Running tenants goes to pending state when this issue occurs in a live upgrade.

Workaround:
Check contents of cavium_n3fips file as shown below.
[appliance]# cat /proc/cavium_n3fips/driver_state
HSM 0:OPERATIONAL_STATE

If the driver changes to an operational state, perform
"docker restart fips-support-pod" to help in recovering.

But if the driver state is still "HSM 0:SAFE_STATE", you may need to perform a power cycle reboot (but this will not guarantee recovery).

Fix:
N/A


1238245 : Prevent system upgrade during firmware update

Links to More Info: BT1238245

Component: F5OS-A

Symptoms:
Triggering a system upgrade when BIOS update is in progress will result in a system reboot, interrupting all processes. The system will get into an inaccessible state.

Conditions:
Trigger system software upgrade when firmware update is running in the background.

Impact:
System gets into inaccessible state and ConfD session become unreachable.

Workaround:
None

Fix:
A compatibility check failure message is displayed stating that the firmware update is in progress.


1233865-5 : Memory capacity and utilization details are confusing / misleading

Links to More Info: BT1233865

Component: F5OS-A

Symptoms:
The memory statistics do not provide a clear or accurate representation of the total memory and how it is being utilized.

Conditions:
Using ConfD to retrieve information about memory capacity and utilization.

Impact:
There are no clear, easy-to-understand statistics for memory capacity and utilization.

Workaround:
N/A

Fix:
More detailed, granular memory statistics are provided to give user a clear understanding of total memory and how it is being used.


1231485-6 : CVE-2020-17541-libjpeg-turbo vulnerability

Links to More Info: K000140960


1229989-8 : CVE-2022-37436 httpd: mod_proxy: HTTP response splitting

Links to More Info: K000132665


1211233-4 : F5OS dashboard in webUI displays the system root file system usage, not the entire disk

Links to More Info: BT1211233

Component: F5OS-A

Symptoms:
The Dashboard page displays disk usage information that can be misleading.

For example, on an r5900 the following information may be shown:

Storage Capacity: 109.4GB
System Storage Free: 89.1GB
System Storage Used: 15%

However, the storage capacity is a value taken from the root (/) filesystem. It does not represent the entire 800GB disk, and does not show information about the file systems where tenant images reside.

Conditions:
View Dashboard page in webUI.

Impact:
This is a cosmetic issue.

Workaround:
Linux commands such as "df -hl -t ext4" will provide detailed information about disk usage.

Another breakdown of the disk partition use can also be seen using "lsblk /dev/nvme0n1". Note that nvme0n1 is the physical disk of interest.

Example from rSeries appliance:

# lsblk /dev/nvme0n1
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
nvme0n1 259:0 0 683.5G 0 disk
|-nvme0n1p1 259:1 0 1G 0 part /boot/efi
|-nvme0n1p2 259:2 0 1G 0 part /boot
|-nvme0n1p3 259:3 0 455.3G 0 part
| `-partition_tenant-root 253:2 0 455.3G 0 lvm /var/F5/system/cbip-disks
|-nvme0n1p4 259:4 0 113.9G 0 part
| `-vdo_vol 253:3 0 227.7G 0 vdo
| `-partition_image-export_chassis 253:4 0 227.7G 0 lvm /var/export/chassis

Fix:
N/A


1208573-2 : Disabling Basic Authentication does not block the RESTCONF GET requests

Links to More Info: BT1208573

Component: F5OS-A

Symptoms:
When basic authentication is disabled by user, RESTCONF GET requests are not getting blocked.

Conditions:
User disables basic authentication. RESTCONF GET requests never get blocked.

Impact:
No effect on configuration. Some of the APIs data will be displayed in RESTCONF GET requests, even when basic authentication is disabled.

Workaround:
None

Fix:
The GET operation for the APIs has been blocked when basic authentication is disabled.


1207889 : FEC configuration on r5k/r10k 25G interfaces

Links to More Info: BT1207889

Component: F5OS-A

Symptoms:
FEC configuration has been added

Conditions:
Interfaces which require FEC configuration to a non default setting.

Impact:
FEC and be enabled or disabled.

Workaround:
None

Fix:
FEC configuration is supported.


1207097-10 : CVE-2018-15664 - API endpoints behind the 'docker cp' command vulnerable to symlink-exchange attack with Directory Traversal

Component: F5OS-A

Symptoms:
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, which gives attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).

Conditions:
N/A

Impact:
It can lead to arbitrary read-write access to the host filesystem with root privileges.

Workaround:
N/A

Fix:
Docker has been updated to a non-vulnerable version.


1205409 : Cannot export or download files from diags/shared/tcpdump path

Links to More Info: BT1205409

Component: F5OS-A

Symptoms:
The diags/shared/tcpdump path gives access to the tcpdump files captured for system diagnostics. However, these files could not be downloaded from the webUI to the local system.

Conditions:
- User generates a tcpdump file for system diagnostics
- User navigates to the diags/shared/tcpdump path in the webUI and tries to download file, resulting in an error

Impact:
Unable to download tcpdump files from diags/shared/tcpdump path in the webUI. Hence, a user cannot access these files from the webUI.

Workaround:
Create /var/docker/config/platform.override.yml with these contents:

version: '2.1'
services:
  http-server:
    volumes:
      - /var/F5/system/shared/tcpdump:/var/shared/tcpdump

Then, restart platform-services.

Fix:
User is now able to download and export files from diags/shared/tcpdump path to any required destination without any errors.


1204985 : The root-causes of F5OS upgrade compatibility check failures are hidden in /var/log/sw-util.log.

Links to More Info: BT1204985

Component: F5OS-A

Symptoms:
When performing a live upgrade, if the upgrade compatibility check fails, users can only see "System database upgrade compatibility check failed" error message. The applicable information about what failed is neither displayed nor shown in platform.log/velos.log.

Conditions:
1. Perforrm a live-upgrade.
2. If the upgrade compatibility check fails, users can only see "System database upgrade compatibility check failed" error message. The applicable information about what failed is neither displayed nor shown in platform.log/velos.log.

Impact:
Upgrade failure logs are not logged in platform.log/velos.log.

Workaround:
None

Fix:
This issue is fixed and displays the error scenarios in platform.log/velos.log.


1200777-6 : systemd vulnerability CVE-2022-2526

Links to More Info: K000132680


1196417 : First time user SSH session is getting closed after password change

Links to More Info: BT1196417

Component: F5OS-A

Symptoms:
User SSH session is getting closed after password change, at the time of first SSH login.

Conditions:
When changing password at the time of first SSH login.

Following is an example:
ssh jeevan1@10.238.160.60
The authenticity of host '10.238.160.60 (10.238.160.60)' can't be established.
ECDSA key fingerprint is SHA256:RlyjC/Tx6uI7rX9zZy6q0ADKkx6GNReSyb1iohYnKio.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.238.160.60' (ECDSA) to the list of known hosts.
jeevan1@10.238.160.60's password:
You are required to change your password immediately (root enforced)
WARNING: Your password has expired.
You must change your password now and login again!
Changing password for user jeevan1.
Changing password for jeevan1.
(current) UNIX password:
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
Connection to 10.238.160.60 closed. <=== SSH session shouldn't be closed.

Impact:
No impact on any of the features due to this issue. The user just needs to log in again with the changed password as the current SSH session will be closed after password change.

Workaround:
N/A

Fix:
To address the issue, /etc/ssh/sshd_config is modified following

F5OS-A 1.8.0
PasswordAuthentication no
ChallengeResponseAuthentication yes


1195561-5 : CVE-2022-3705 vim: a use after free in the function qf_update_buffer

Component: F5OS-A

Symptoms:
A use-after-free flaw was found in the qf_update_buffer function in vim. This issue allows a specially crafted file to crash a program, use unexpected values, or execute code.

Conditions:
NA

Impact:
Users might experience unexpected termination of vim or internal memory inconsistencies during quickfix buffer operations.

Workaround:
NA

Fix:
This issue has been addressed with a fix


1194885-9 : CVE-2022-37434 zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field

Links to More Info: K67213091, BT1194885


1188825 : New role named "user" with read-only access to non-sensitive system level data

Component: F5OS-A

Symptoms:
To meet security requirements, you need to create a user account on F5OS that cannot access sensitive data, such as platform logs, system events, login activities, and more.

Conditions:
Create user account with roles available on the F5OS using the following CLI command:
system aaa authentication users user <user_name> config role <role_name>

Impact:
F5OS is unable to meet defined security requirements.

Workaround:
None

Fix:
A new user role named “user” is provided on F5OS to have a role with no access to the sensitive data such as platform logs, system events, and login activities and meet security requirements.


1188069 : F5OS installer does not indicate progress or completion state

Links to More Info: BT1188069

Component: F5OS-A

Symptoms:
The F5OS installer does not indicate the process or completion state of upgrade/installation.

Conditions:
Upgrade/reboot the system.

Impact:
You are unable to identify the readiness state of system.

Workaround:
None

Fix:
The upgrade, installation or initialization detail is now included in the system's bash prompt.


1187013-17 : libtasn1 CVEs CVE-2018-1000654, CVE-2017-10790, CVE-2017-6891, CVE-2016-4008

Component: F5OS-A

Symptoms:
Multiple libtasn1 CVEs
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.

The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.

Conditions:
NA

Impact:
NA

Workaround:
NA

Fix:
Fixed


1187001-5 : CVE-2019-3859, CVE-2019-3860: libssh2

Links to More Info: K000149288


1186957-9 : CVE-2022-35737: sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API

Links to More Info: K000130512


1186921-9 : libarchive : CVE-2016-8688, CVE-2016-8687, CVE-2017-5601, CVE-2015-8915, CVE-2017-14501, CVE-2015-8933, CVE-2020-21674, CVE-2015-2304, CVE-2017-14166, CVE-2016-10209, CVE-2016-10350, CVE-2016-8689, CVE-2016-10349

Links to More Info: K000148259


1186633-9 : CVE-2017-17840 iscsi-initiator-utils: Heap-based buffer overflow in

Component: F5OS-A

Symptoms:
An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

Conditions:
N/A

Impact:
The greatest impact of this flaw is on confidentiality and integrity, with some potential impact on availability as well.

Workaround:
N/A

Fix:
Fixed


1186625-9 : CVE-2019-11360 iptables: buffer overflow in iptables-restore

Component: F5OS-A

Symptoms:
A buffer overflow flaw was found in iptables-restore. This flaw allows a local attacker with sufficiently high privileges, such as root, to provide a specially crafted file, causing a program crash or potential code execution.

Conditions:
N/A

Impact:
The highest threat from this vulnerability is to system availability.

Workaround:
Restrict access to the command line to trusted users

Fix:
Fixed


1186621-9 : CVE-2019-20795 iproute: use-after-free in get_netnsid_from_name in ip/ipnetns.c

Component: F5OS-A

Symptoms:
A use-after-free flaw was found in iproute in the network namespace management component of the ip command-line utility.This flaw allows a local attacker to crash the program while displaying network namespaces.

Conditions:
N/A

Impact:
The highest threat from this vulnerability is to system availability.

Workaround:
N/A

Fix:
Fixed


1186617-10 : CVE-2014-3564 gpgme: heap-based buffer overflow in gpgsm status handler

Component: F5OS-A

Symptoms:
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1

Conditions:
N/A

Impact:
remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."

Workaround:
N/A

Fix:
Fixed


1186589-9 : CVE-2016-1234 glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory

Links to More Info: K05125306


1186569-7 : CVE-2018-16429 : Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c

Component: F5OS-A

Symptoms:
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().

Conditions:
N/A

Impact:
System availability which is the result of out of bound read

Workaround:
N/A

Fix:
Fixed


1186565-6 : CVE-2020-13645 glib-networking: GTlsClientConnection silently ignores unset server identity

Component: F5OS-A

Symptoms:
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.

Conditions:
N/A

Impact:
Potential low impact on the system's confidentiality and integrity.

Workaround:
N/A

Fix:
Fixed


1186549-6 : CVE-2021-0308 , CVE-2020-0256 : gdisk vulnerabilities

Component: F5OS-A

Symptoms:
An out-of-bounds write flaw was found in gdisks' in ' LoadPartitionTable() function of 'gpt.cc' and ' ReadLogicalParts() function of 'basicmbr.cc'

Conditions:
The use of a malicious storage device (for example, a USB Stick) that can cause a crash when physically inserted

Impact:
local privilege escalation.

Workaround:
Restrict access to the storage device to only highly privileged and trusted users.

Fix:
Fixed


1186517-9 : CVE-2015-8872 , CVE-2016-4804: dosfstools

Component: F5OS-A

Symptoms:
dosfstools (prior to v4.0) contain multiple implementation flaws in FAT filesystem parsing, including off‑by‑two errors and unsafe memory handling during FAT table and boot sector processing.

Conditions:
N/A

Impact:
denial of service

Workaround:
n/A

Fix:
Fixed


1185805-1 : The "test media" option during USB install may be interrupted by the hardware watchdog

Links to More Info: BT1185805

Component: F5OS-A

Symptoms:
During USB booting there is an option for "Test this media & install F5OS". If this is selected then the system verifies the media for only 5 minutes before the hardware watchdog reboots the device and the verification is interrupted.

Conditions:
USB booting, "test media" option selected.

Impact:
The "test media" option does not work.


1185573-8 : CVE-2019-9704

Component: F5OS-A

Symptoms:
Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (daemon crash) via a large crontab file because the calloc return value is not checked.

Conditions:
NA

Impact:
allows local users to cause a denial of service

Workaround:
Restrict access to local trusted user.

Fix:
fixed by updating the package.


1185305-9 : CVE-2020-14367 chrony: Insecure writing to PID file

Component: F5OS-A

Symptoms:
A flaw was found in chrony when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check for an existing symbolic link with the same file name.

Conditions:
N/A

Impact:
data loss and Denial of service

Workaround:
Restrict access to create a symlink to a trusted user.

Fix:
Fixed


1185301-9 : CVE-2016-3189 bzip2: heap use after free in bzip2recover

Links to More Info: K45816067


1184905-9 : CVE-2021-3468 avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket

Component: F5OS-A

Symptoms:
A flaw was found in avahi. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop.

Conditions:
N/A

Impact:
The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

Workaround:
N/A

Fix:
Fixed.


1184073-13 : Python and python-urllib3 security vulnerabilities (CVE-2021-3177, CVE-2020-26137, CVE-2020-26116)

Links to More Info: K000133759


1171849-4 : CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

Links to More Info: K32615023


1169625-7 : CVE-2018-20685: openssh: scp client improper directory name validation

Links to More Info: K11315080


1167477-5 : CVE-2021-20233: grub2 - Heap out-of-bounds write due to miscalculation of space required for quoting

Component: F5OS-A

Symptoms:
A flaw was found in grub2 in versions prior to 2.06. The option parser allows a user to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Conditions:
N/A

Impact:
N/A

Workaround:
N/A

Fix:
Grub2 has been updated to a non-vulnerable version.


1167457-6 : CVE-2022-27404, CVE-2022-27405, CVE-2022-27406: freetype

Links to More Info: K000141126


1167073-12 : CVE-2021-3580 nettle: Remote crash in RSA decryption via manipulated ciphertext

Component: F5OS-A

Symptoms:
A flaw was found in nettle in the way its RSA decryption functions handle specially crafted ciphertext. This flaw allows an attacker to provide a manipulated ciphertext

Conditions:
N/A

Impact:
Application crash and a denial of service

Workaround:
N/A

Fix:
Fixed


1167069-11 : CVE-2021-38185: cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file

Component: F5OS-A

Symptoms:
A flaw was found in cpio. An integer overflow that triggers an out-of-bounds heap write can allow an attacker to execute arbitrary code via a crafted pattern file.

Conditions:
NA

Impact:
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Workaround:
NA

Fix:
Fixed


1166921-12 : libsolv: CVE-2021-33928, CVE-2021-33930, CVE-2021-33938 , CVE-2021-33929

Component: F5OS-A

Symptoms:
Multiple flaws in glibc in various functions.

Conditions:
N/A

Impact:
denial of service

Workaround:
N/A

Fix:
Fixed


1166869-12 : CVE-2021-3520 lz4: memory corruption due to an integer overflow bug caused by memmove argument

Component: F5OS-A

Symptoms:
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash.

Conditions:
N/A

Impact:
The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.

Workaround:
N/A

Fix:
Fixed


1162341 : Front panel interface status is not reported in alarms or events

Links to More Info: BT1162341

Component: F5OS-A

Symptoms:
Front panel interface flap events are not displayed in alarms or events CLI/GUI.

Conditions:
Front panel interface is down or oper-status changes.

Impact:
Interface status is not shown in alarms or events.

Workaround:
View interface with "show interfaces interface state oper-status".


1154733 : LLDP error on management interface

Links to More Info: BT1154733

Component: F5OS-A

Symptoms:
LLDP on mgmt interface is not supported. When enabled, show lldp command in ConfD CLI will not show any info related to mgmt interface.
Also, when enabled, below log will be displayed:

lldpd[8]: priority="Err" version=1.0 msgid=0x7302000000000021 msg="Failed to get did from interface name." ifname="mgmt"

Conditions:
When LLDP is enabled using ConfD CLI.

Impact:
The system logs an error message every 30 seconds:

lldpd[8]: priority="Err" version=1.0 msgid=0x7302000000000021 msg="Failed to get did from interface name." ifname="mgmt"

Workaround:
None

Fix:
NA


1147673 : Downloading QKViews directly from the System Reports screen.

Links to More Info: BT1147673

Component: F5OS-A

Symptoms:
The F5OS-A webUI lacks the ability to download QKView files directly from the System Reports screen. You must navigate to the File Utilities screen to perform the action.

Conditions:
Download QKView files.

Impact:
No functional impact, you need to navigate to a different webUI screen to download QKView files.

Workaround:
Navigate to the File Utilities screen to download QKView files.

Fix:
From F5OS-A v1.8.0, QKView files can be downloaded from System Reports screen.


1145049 : K3s cluster deployment sequence is modified to avoid pods entering into UNKNOWN state

Links to More Info: BT1145049

Component: F5OS-A

Symptoms:
CNI pods enter into UNKNOWN state.

Conditions:
Multus is installed before Flannel installation is successful.

Impact:
K3s cluster deployment fails.

Workaround:
Restart K3s cluster deployment.

Fix:
K3s cluster deployment sequence is modified to avoid pods entering into UNKNOWN state.


1140577 : config-restore will cause a reboot if the portgroup configuration changes

Links to More Info: BT1140577

Component: F5OS-A

Symptoms:
If config-restore causes the portgroup configuration to change, the system will reboot automatically, but no warning prompt is given.

Conditions:
Restoring a saved configuration with a different portgroup configuration than the current configuration.

Impact:
System reboots unexpectedly.

Workaround:
N/A

Fix:
System provide a warning prompt notifying of a reboot prior to it happening.


1136557 : F5OS config restore fails if .iso or components vary between two devices.

Links to More Info: BT1136557

Component: F5OS-A

Symptoms:
If the .iso or components in the backup file do not match the ones in the restore file, the restore operation fails with admin access denied error:

Error: Database config-restore failed.

Conditions:
Take a config backup from one device and restore it on another device on where .iso or components vary.

Impact:
Configuration restore fails.

Workaround:
Ensure that .iso and components match when performing backup and restore between devices.


1135845 : Increased interval for boot device selector hot-key 'b' acceptance after the BIOS banner

Links to More Info: BT1135845

Component: F5OS-A

Symptoms:
Users may miss the boot selector hot-key 'b' at the BIOS banner because of the short interval, with the banner displayed, before boot proceeds.

Conditions:
Reboot of the appliance.

Impact:
Reboot required to catch the interval where the hot-key is accepted.

Workaround:
Repeatedly pressing the 'b' hotkey during BIOS POST codes will not negatively affect the BIOS POST and should fall within the 3 second interval after the banner is displayed.

Fix:
'b' hot-key accept interval, after the BIOS banner is displayed, has been increased to 5 seconds.


1135021 : F5OS config-restore with an incorrect primary-key does not produce a warning

Links to More Info: BT1135021

Component: F5OS-A

Symptoms:
'system database config-restore' does not verify that the backup file is encrypted with the same database primary-key that is currently active on the device.

Conditions:
Restoring a config-backup on a device with a different primary-key than when the backup was produced.

Impact:
System will not operate properly because it will not be able to decode encrypted secrets that control certificates, private keys, and other items. Tenants will not operate properly.

Workaround:
Ensure that a new config-backup is created after executing the "system aaa authentication primary-key set" command.

Fix:
Config-restore fails is the database primary key does not match the config backup file, and reports the primary-key hash. Reset the primary-key to match the backup file in order to restore the backup file.


1128633-3 : Failed upload entries displayed under CLI file transfer-operations

Links to More Info: BT1128633

Component: F5OS-A

Symptoms:
Old, failed uploads continue to display in the file transfer-operations list for an unknown period of time both in CLI and GUI.

Conditions:
If the image upload operation fails for some unknown reason, then the failed entries are listed under both the transfer-status list and the transfer-operations list. The list under transfer-status is cleared every 24 hours, but the list under transfer-operations remains.

Impact:
- As old, failed uploads continue to display in the list for an unknown period of time, the list under transfer-operations is more cluttered.
- There is no functional impact.

Workaround:
None

Fix:
All operation entries are cleared if their transfer time exceeds 24 hrs making the file transfer-operations list clutter free.


1126865-2 : F5OS HAL lock up if the LCD module is not responding.

Links to More Info: BT1126865

Component: F5OS-A

Symptoms:
There are rare cases where the LCD module is present, enabled, and its network link is up; however, it does not respond to requests made by the HAL. Ultimately this causes a the HAL services to become unresponsive.

Conditions:
There are rare cases where the LCD does not respond to requests from the HAL services. When this happens, the HAL service can get locked up.

Impact:
When this rare event occurs, the HAL becomes unresponsive for other devices in the system, like the AOM for example.

Workaround:
If this occurs, a restart of the HAL services or a reset of the system is required to clear the condition.


1124953-2 : Intel microcode updates: CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166

Links to More Info: K04808933, BT1124953


1124853-1 : Backup and restore fails when port-profile is mismatched

Links to More Info: BT1124853

Component: F5OS-A

Symptoms:
Because there will be some configuration changes between two different port-profiles, database backup and restore between two appliances with different port-profiles will fail.

Conditions:
Make sure both source and target appliances have the same port-profile configurations before performing a database
restore.

Impact:
A database restore will fail when port-profile configuration is mismatched.

Workaround:
The target appliance where the restore is being performed should have the same port-profile as the backup database.

Fix:
Fix is that the target appliance where we are performing restore should have same port-profile as backup database.


1124809 : Add or improve the reporting status of imported images

Links to More Info: BT1124809

Component: F5OS-A

Symptoms:
There are no correct error messages or status is shown in the log files and in the CLI, when the non-compatible images, corrupted images, or zero-sized images are copied to the imported directories.

It is difficult to determine the exact problem, as they had to examine the import directory and mount status of the ISO file being copied.

Conditions:
Coping zero-length, file name having special characters, corrupted or incompatible ISO files to the import directory /var/import/staging.

Impact:
No status is displayed in the CLI and in the log files.

Workaround:
None

Fix:
The log files will display the exact error messages. System events will show the cause of the error and SNMP traps are generated in the event of the error.


1123141-8 : Apache HTTP Server ap_strcmp_match() Out-of-Bounds Read (CVE-2022-28615)

Links to More Info: K40582331


1121921 : Common name for setup-wizard tool across platforms

Links to More Info: BT1121921

Component: F5OS-A

Symptoms:
The setup-wizard tool command is named differently in F5OS-A and F5OS-C, which can be confusing for administrators of both systems.

Conditions:
'appliance-setup-wizard' is used to run tool in F5OS-A bash prompt whereas 'velos-setup-wizard' is used in F5OS-C.

Impact:
Increases complexity and creates confusion in running the tool on device.

Workaround:
None

Fix:
'setup-wizard' is made as a common command name to run the tool on both F5OS-A and F5OS-C


1113897-8 : CVE-2022-26377 httpd: mod_proxy_ajp: Possible request smuggling

Links to More Info: K26314875


1107361-3 : CVE-2020-15113 etcd: directories created via os.MkdirAll are not checked for permissions

Component: F5OS-A

Symptoms:
A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.

Conditions:
etcd versions before 3.3.23 and 3.4.10

Impact:
May allow unauthorized system access

Workaround:
Ensure directories used by etcd have appropriate permissions and ownership set.

Fix:
Removed the etcd RPM.


1099069-3 : Issues with pulling files from F5OS device using SCP

Links to More Info: BT1099069

Component: F5OS-A

Symptoms:
Unable to pull packet capture files off of the F5OS device using SCP from admin.

Conditions:
Download packet capture files using SCP from the admin account.

Impact:
Unable to download packet capture files through SCP from admin.

Workaround:
N/A

Fix:
Added support to download files from more directories.


1095225-4 : CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it

Links to More Info: K52379673


1093681-5 : CVE-2022-0359 vim: Heap-based buffer overflow in init_ccline() in ex_getln.c

Links to More Info: K08827426, BT1093681


1057401 : CVE-2018-16402 libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service or possibly have unspecified other impact

Links to More Info: K21426934, BT1057401


1008701-1 : Using curl to access 'scp:' URIs on the partition management IP does not work

Links to More Info: BT1008701

Component: F5OS-A

Symptoms:
Attempting to upload a tenant image via

"curl filename scp:IMAGES"

would fail, even though

"scp filename admin@mgmt-ip:IMAGES"

works.

Conditions:
Accessing ssh/scp via curl rather that the scp application.

Impact:
Cannot use curl to copy files.

Workaround:
Use scp directly rather than curl.

Fix:
The ssh/scp server has been fixed to correctly interpret the file/directory names supplied by the 'curl' command.



Known Issues in F5OS-A v1.8.x


F5OS-A Issues

ID Number Severity Links to More Info Description
1585373-2 1-Blocking BT1585373 Outdated or old Service-Instances for tenant in rSeries platforms
1338645-2 1-Blocking K000151762, BT1338645 R2000/R4000 silent reboot
1273013-3 1-Blocking Five percent (5%) deviation can be observed in TPS performance on R10920 and R5920 tenant
1083061-2 1-Blocking Loading saved config to BIG-IP fails if host modifications are made after "tmsh save sys config"
2198745 2-Critical RADIUS/TACACS+ Remote users other than 9000 GID login fails Intermittently
2162701-3 2-Critical BT2162701 Tenant outage caused by deletion of VLAN in the tenant and unassignment of the VLAN from F5OS
1981429-1 2-Critical Config backup and restore is failing after downgrading from 2.0 to lower versions
1797681-1 2-Critical BT1797681 F5OS device fails to block port based on STP path cost
1759097-3 2-Critical BT1759097 F5OS STP with LAG sends BPDU on single interface regardless of member interface status
1712009-3 2-Critical BT1712009 Attempting to perform a configuration restore, after downgrading from v1.8.0, makes the system inoperable
1627293-2 2-Critical BT1627293 GUI session may log out prematurely
1622869-2 2-Critical BT1622869 Might see TPOB core after HA disassembly
1621449-1 2-Critical Error related to removal of orphan pod related subpaths in /var/log/messages
1614333 2-Critical BT1614333 OPT-0054-01, Innolight (TR-PY13L-NF5, Rev ‘R1A’) optic experiencing intermittent link problems when connected to r2000/r4000 port 5.0
1594149 2-Critical Next Tenant Management interface is turned down/unreachable
1591961-1 2-Critical Observing "Failed to send restarting msg to VF" errors during reboot
1586089 2-Critical BT1586089 Resource-admin is unable to perform SCP.
1575953-1 2-Critical BIG-IP NEXT tenant stuck at provisioning state with live upgrade when tenant bring-up is in progress
1574773-1 2-Critical On rSeries system, operations which involve reboot, might result in Tenant failure state
1568485-2 2-Critical BT1568485 GRE V1 packets are being dropped before even reaching BIG-IP on F5 r2xxx/r4xxx
1380705 2-Critical BIG-IP tenant is stuck during boot up after doing tenant upgrade from 15.1.x to 17.1.x
1378917-2 2-Critical FIPS partition details are not seen in the tenant console when it is configured without waiting until its status is 'Running'
1224113-2 2-Critical IPV6 packets are fragmented on R2x00/R4x00 platforms.
2285069-1 3-Major LDAPS: DomainSID fails to populate intermittently when toggling Active Directory configuration with TLS client certificate and key
2261481-2 3-Major BT2261481 Packet loss on a F5OS tenant when vlan-groups are in use
2257381-1 3-Major BT2257381 Creating a new tenant shortly after deleting one with the same name fails intermittently
2230673-2 3-Major BT2230673 Tenant image upload silently fails
2225577-1 3-Major BT2225577 AOM and fan alarms persist on rSeries appliance persist after hardware replacement and cannot be cleared
2208601-1 3-Major BT2208601 Long BIG-IP tenant names will prevent virtual console access
2171805-1 3-Major BT2171805 DmaTenantTcpCopOperHdlr, couldn't find stats for tenant
2163677-1 3-Major BT2163677 K3s install fails if a weak SSH MAC algorithm is configured
2152353-2 3-Major BT2152353 The "system aaa tls config passphrase" command does not validate whether or not the new passphrase correctly decrypts the current key file
2141089-1 3-Major BT2141089 Multicast traffic can be dropped by Host DLF rate-limiter
2047189-1 3-Major BT2047189 On rSeries system, FIPS partition name should use escape sequence for special characters.
2035593-1 3-Major BT2035593 Max DNS entries supported are three, if more are configured the extras are ignored, and even after reducing to three, the previously ignored entries are not reapplied.
1890289-1 3-Major BT1890289 Stp stats (ex counters) are not reset when stp mode removed and added again.
1778721-2 3-Major BT1778721 PAM faillock data is deleted on restart, allowing users to log in immediately
1624665-2 3-Major BT1624665 ConfD state data shows key and certificate configured for secure (mTLS) even after deleting from config
1623345-1 3-Major BT1623345 On rSeries system, power cycle reboot might result in QAT device failure
1623101-1 3-Major BT1623101 External OTEL server receives log data for both the platform and event logs, even if only one of them has been configured
1621917 3-Major BT1621917 Stale VFIO devices entries upon BIG-IP Next Tenant deletion
1621785-1 3-Major Mstp topology convergence after changing the priority of instance is not taking place.
1621769-1 3-Major Observing FPGA errors when VLAN cannot configured for the interface and VLAN state is not set up
1621757-1 3-Major Observing "Stp Maapi request to readPortFlushes failed" errors while enabling MSTP port
1620597 3-Major BT1620597 Reset counter functionality not working properly on rSeries platforms
1619925-1 3-Major BT1619925 Tenant disk utilization stats fail to clear after deleting the tenant.
1612429 3-Major BT1612429 License installation is not working with HTTPS Proxy server
1612101-1 3-Major BT1612101 When vCPU cores configuration changed for BIG-IP Next tenant, RRD stats shows both the old and new CPU data stats
1603685-1 3-Major ISO import status is stuck at verifying and ISO removal does not remove the ISO from /var/import/staging
1603669-1 3-Major BT1603669 Show services command shows stale entries for deleted tenants
1600949 3-Major Tenant status is not accurate when the F5OS upgrade is in progress
1589161 3-Major BT1589161 Observing kube-dns service error log flood in /var/log/messages after appliance downgrade
1587569-1 3-Major Every tenant receives the traffic of all other tenants if VLAN is shared across
1585609-1 3-Major rSeries tenant silent reboot; Tenant liveness probes failed
1585237 3-Major BT1585237 When telemetry exporter is not reachable, logs to enable send_queue or retry will be printed in platform.log
1575433-2 3-Major "ReadyRequest failed for 'system_fpga' @ 'tcp://127.0.0.1:1060', Inner -> 'receive timeout'" logs are being seen couple of times a day
1566917-2 3-Major The ha-1-deployment pod may get restarted after HA setup and system upgrades
1552921 3-Major BT1552921 Password policy option reject-username set to false has no effect
1505497-3 3-Major During remote logging server configuration, selectors help menu does not display when using Tab key.
1491209-1 3-Major BT1491209 Non-root, local authentication fails when LDAP is configured with chase referrals and an invalid DNS server is configured
1469485-1 3-Major BT1469485 "show components component state memory full" does not have any meaningful output
1399129 3-Major BT1399129 Duplicate platform agent log entries when tenant starts
1381237-2 3-Major Messages like "Failed to set up mount unit" may flood in /var/log/messages file
1381053 3-Major BT1381053 Cluster IP is unavailable for some time during tenant reboot
1377629-2 3-Major Failed to ping tenant mgmt-ip
1338557 3-Major BT1338557 VM events are not captured inside the log file
1327229-2 3-Major Some nuisance messages are sent to the platform log after every authentication configuration change
1326021-2 3-Major BT1326021 Corrupted state of data plane in r5600 can result in egress packet corruption
1320853 3-Major BT1320853 Config restore fails on system with lower size if the tenant is deployed with max size on original system
1253717 3-Major BT1253717 iavf driver crashes intermittently on r2000 or r4000 systems during system reboot
1222721 3-Major BT1222721 Deletion of STP configuration using "no stp" is failing
1195201-3 3-Major BT1195201 Missing/defective DIMM not reported sufficiently to end user
1083921-2 3-Major VLAN name change is not allowed once a tenant is launched
1080437-2 3-Major VerifyDmesg test failure
1063649-2 3-Major Changing the system date to be older than the installation date is not supported.
1929185-2 4-Minor BT1929185 "Failed to write to cdb" and "Unable to set STP VLAN state" error logs are seen with MSTP configuration deletion via CLI
1490621-1 4-Minor BT1490621 Snmpv1 traps have a agent-addr set to 0.0.0.0 instead of a management IP
1390485 4-Minor Calendar navigator skips one month
1112317-1 4-Minor BT1112317 Null bytes or non-ascii characters are present in velos.log

Known Issue details for F5OS-A v1.8.x

2285069-1 : LDAPS: DomainSID fails to populate intermittently when toggling Active Directory configuration with TLS client certificate and key

Component: F5OS-A

Symptoms:
After configuring LDAPs with a root certificate, TLS client certificate, and key, toggling the Active Directory or Unix attributes settings may cause the DomainSID to fail to populate for LDAP group accounts, resulting in authentication failures.

Conditions:
This issue occurs when the following CLI commands are executed to toggle LDAP Active Directory and Unix attributes settings:

system aaa authentication ldap active_directory false
system aaa authentication ldap unix_attributes true

system aaa authentication ldap active_directory true
system aaa authentication ldap unix_attributes false

Impact:
Users in LDAP groups mapped to F5OS roles will experience authentication failures.

Workaround:
Restart the authentication-mgr service using the following CLI command:

system diagnostics os-utils docker restart node platform service authentication-mgr


2261481-2 : Packet loss on a F5OS tenant when vlan-groups are in use

Links to More Info: BT2261481

Component: F5OS-A

Symptoms:
On an F5OS tenant, there may be packet loss when vlan-groups are in use. This occurs due to high churn inside the FDB table due to MAC addresses being learned between different host ports resulting in temporary DLF drops while the MAC is learned on the new port.

Conditions:
- BX520 blade
- VLAN groups
- A large amount of unique MAC addresses in the FDB table

Impact:
Packet loss. Failing monitor probes.

Workaround:
Monitor probe issues may be alleviated by creating a static FDB entry for the local admin bit flipped MAC address that TMM is egressing packets from.


2257381-1 : Creating a new tenant shortly after deleting one with the same name fails intermittently

Links to More Info: BT2257381

Component: F5OS-A

Symptoms:
Tenant creation will occasionally fail when creating a tenant with the same name as one that was recently deleted.

Conditions:
Deleting and then quickly recreating a tenant with the same time.

Impact:
Stale pod get left behind, consuming resources on the system and potentially blocking creation of additional tenants.

Workaround:
Allow more time between deleting and recreating a tenant with the same name.


2230673-2 : Tenant image upload silently fails

Links to More Info: BT2230673

Component: F5OS-A

Symptoms:
In some scenarios extra disk space is required for a tenant image. If there is enough space to upload the image, but not enough extra space, the operation will silently fail.

Conditions:
Enough disk space available to upload a tenant image, but not enough to copy it.

Impact:
Silent failure when uploading a tenant image.

Workaround:
Clear disk space by removing old tenant images, or resize the images volume.


2225577-1 : AOM and fan alarms persist on rSeries appliance persist after hardware replacement and cannot be cleared

Links to More Info: BT2225577

Component: F5OS-A

Symptoms:
After replacing a faulty fan tray via RMA, critical fan and AOM fault alarms remain visible in show system alarms even though replacement hardware is operating normally and show system health reports all components as healthy. Standard docker alert-service clear commands fail to remove the stale alarms.

Conditions:
Fan tray hardware replaced via RMA
Replacement fans operating correctly (>15K RPM, health status: ok)

Impact:
Persistent false-positive critical alarms create operational confusion and monitoring noise.

Workaround:
Log into the system as root and run:
docker exec alert-service /confd/test/sendAlert -n "<message>" -s <Resource> -r clear -se error -i <ID> -d "<Text>"

If above does not clear it.
1. docker restart alert-service
2.docker exec alert-service /confd/test/sendAlert -n "<message>" -s <Resource> -r clear -se error -i <ID> -d "<Text>"


2208601-1 : Long BIG-IP tenant names will prevent virtual console access

Links to More Info: BT2208601

Component: F5OS-A

Symptoms:
Creating a BIG-IP tenant in the GUI with a name longer than 32 characters will prevent virtual console access to the tenant.

Conditions:
BIG-IP tenant name is longer than 32 characters.

Impact:
The creation of the tenant-console user fails, preventing access to the virtual console for that tenant.

Workaround:
Use tenant names that don't exceed 32 characters in length.


2198745 : RADIUS/TACACS+ Remote users other than 9000 GID login fails Intermittently

Component: F5OS-A

Symptoms:
Intermittently, RADIUS and TACACS+ remote users are unable to login with "No valid role group found in user groups."

Conditions:
1. RADIUS or TACACS+ Authentication is enabled.
2. Users with GID 9000 (who are admins) are able to login
3. Users with other than 9000 are unable to login
4. File "/etc/libnss-udr/group" is not getting updated with other than admin roles.

Impact:
RADIUS and TACACS+ remote users other than 9000 GID login fails Intermittently

Workaround:
None


2171805-1 : DmaTenantTcpCopOperHdlr, couldn't find stats for tenant

Links to More Info: BT2171805

Component: F5OS-A

Symptoms:
An error is found in platform.log

platform-stats-bridge[10]: nodename=controller-1(p3) priority="Err" version=1.0 msgid=0x4305000000000008 msg="" msg="DmaTenantTcpCopOperHdlr, couldn't find stats for tenant".

Conditions:
-- Tenant is in configured or not deployed completely
-- tcp-cop stats are queried when there are not yet any stats. (show tenants tenant tcp-cop tcp-cop)

Impact:
No functional impact. The log message is logged at the error level and should be logged at the warning level.

Workaround:
None


2163677-1 : K3s install fails if a weak SSH MAC algorithm is configured

Links to More Info: BT2163677

Component: F5OS-A

Symptoms:
If a weak SSH MAC algorithm is configured (via "system security services service sshd"), K3s will fail to install.

Conditions:
-- Appliance.
-- Weak SSH MAC algorithm configured.

Impact:
This can prevent upgrades or K3s reinstallations.

Workaround:
Configure a strong SSH MAC algorithm, e.g. hmac-sha2-256. In the CLI:

config
system security services service sshd config macs [ hmac-sha2-256 ]
commit

It is possible to configure multiple MAC algorithms, in which case the administrator should keep the stronger algorithms enabled as well.


2162701-3 : Tenant outage caused by deletion of VLAN in the tenant and unassignment of the VLAN from F5OS

Links to More Info: BT2162701

Component: F5OS-A

Symptoms:
When a VLAN inside the tenant is deleted and the VLAN is un-assigned from F5OS, a service for the tenant could be deleted. Deletion of service will cause an outage on the tenant.

Here are the two log messages on F5OS

datapath-cp-proxy[11]: priority="Info" msgid=0x5901000000000045 msg="Confd Event Update:" EVENT="DELETE_SERVICE_ID" FROM="CONFD" TENANTNAME="" ATSE=0 SUBMODULE=0.

datapath-cp-proxy[11]: priority="Info" msgid=0x5901000000000034 msg="Service Instance Update Success." TENANTNAME="tenant-1" DOSGRP="[2]" SVCGRP="[7]" SVCID=22.

Conditions:
-- Deletion of the VLAN inside the tenant.
-- Un-assignment of the same VLAN from the F5OS.

Impact:
Because the service is removed, all VLANs on that service will be inaccessible for the tenant and cause an outage in the tenant.

Workaround:
If a VLAN is going to be deleted from the tenant, first un-assign the VLAN inside the tenant from F5OS. Then after a 2 second delay, delete the VLAN inside the tenant.


2152353-2 : The "system aaa tls config passphrase" command does not validate whether or not the new passphrase correctly decrypts the current key file

Links to More Info: BT2152353

Component: F5OS-A

Symptoms:
If the GUI is configured to use a custom key and certificate ("system aaa tls config certificate" and "system aaa tls config key") and use an encrypted key file protected by a passphrase ("system aaa tls config passphrase"), the system fails to perform validation for subsequent changes to the passphrase (and the system is not decrypting and re-encrypting the key file).

Conditions:
-- System is configured to use a custom key and certificate for GUI access.
-- They key is encrypted with a passphrase, and "system aaa tls config passphrase" is used to set this passphrase in F5OS.
-- "system aaa tls config passphrase" is later used to change the passphrase, but the underlying key is not changed.

Impact:
-- Key migration fails
-- HTTP GUI and API are rendered unusable

Workaround:
Using the CLI:

-- Manually re-encrypt the key to use the new passphrase.
OR
-- Change the passphrase ("system aaa tls config passphrase") back to the one that matches they key.


2141089-1 : Multicast traffic can be dropped by Host DLF rate-limiter

Links to More Info: BT2141089

Component: F5OS-A

Symptoms:
Multicast traffic from a tenant can be dropped by the host DLF rate-limiter, causing traffic loss.

Conditions:
Egress multicast traffic exceeding 2500 packets per second.

Impact:
Loss of multicast traffic.

Workaround:
Create a static FDB entry for the multicast MAC address.


2047189-1 : On rSeries system, FIPS partition name should use escape sequence for special characters.

Links to More Info: BT2047189

Component: F5OS-A

Symptoms:
Partitions are created with truncated names when the name contains a special character.

appliance-1(config)# fips set-partition name T!est keys 1000 accel-devs 2 Value for 'so-password' (<string, min: 7 chars, max: 30 chars>): ********
result fips partition T has been created
appliance-1(config)# exit
appliance-1# show fips partitions
                                    OCCUPIED
            ACCEL FIPS SESSION SESSION PCI
NAME KEYS DEVS BACKUP STATE KEYS COUNT ADDRESS
----------------------------------------------------------------
T 3100 2 disabled -1 0 0 c3:10.4

appliance-1#

Conditions:
-- Creating a partition
-- Special characters like ; and ! are used in partition name.

Impact:
The partitions are not created with expected name.

Workaround:
None


2035593-1 : Max DNS entries supported are three, if more are configured the extras are ignored, and even after reducing to three, the previously ignored entries are not reapplied.

Links to More Info: BT2035593

Component: F5OS-A

Symptoms:
The system supports a maximum of three DNS entries. When more than three are configured, the additional entries are ignored. However, after removing the extra entries and reducing the list to three, the previously ignored entries are still not added back to the system.

Conditions:
Configuring more than 3 DNS entries and removing previously added entries

Impact:
DNS resolution failure.

Workaround:
Recreate DNS entries


1981429-1 : Config backup and restore is failing after downgrading from 2.0 to lower versions

Component: F5OS-A

Symptoms:
When restoring a configuration from backup, the restore action fails with an error:

Error: response 'Failed.' confd_load: 662: maapi_apply_trans_flags(sock, tid, 0, aflags) failed: external error (19): /oc-sys:system/f5-security-ciphers:security/
services/service{httpd}/config/ssl-ciphersuite: Invalid openssl cipher received: TLS_AES_256_GCM_SHA384

Conditions:
-- Config backup is taken after downgrading from 2.0.
-- The backup file is used to restore the configuration.

Impact:
Config restore fails due to unsupported ciphers present.

Workaround:
There are three possible workarounds:

-- The issue will not be seen if rollback is applied before downgrading from 2.0
-- Issue will not be seen if config-backup is taken before upgrading to 2.0 from lower versions and then config-restore is applied after downgrading to lower versions.
-- If config-backup is not taken before upgrading to 2.0, then after downgrading to lower versions, execute "no system security services service httpd" before taking config-backup.


1929185-2 : "Failed to write to cdb" and "Unable to set STP VLAN state" error logs are seen with MSTP configuration deletion via CLI

Links to More Info: BT1929185

Component: F5OS-A

Symptoms:
Stpd and FPGA error logs are observed while doing MSTP configuration.

In platform.log:
stpd[1]: priority="Err" version=1.0 msgid=0x6102000000000018 msg="Failed to write to cdb" FIELD="MST Instance mst-id" ERRNO=8 ERRNOSTR="badly formatted or nonexistent path".
stpd[1]: priority="Err" version=1.0 msgid=0x6102000000000018 msg="Failed to write to cdb" FIELD="MST Instance designated-root-address" ERRNO=8 ERRNOSTR="badly formatted or nonexistent path".
stpd[1]: priority="Err" version=1.0 msgid=0x6102000000000018 msg="Failed to write to cdb" FIELD="WriteTenantOperMSTInstance failed" ERRNO=0 ERRNOSTR="Unknown error".

Conditions:
1. Create VLANs.
2. Attach VLANs to the interfaces.
3. Enable MSTP using webUI. Select Network Settings > STP configuration and select MSTP.
4. Create an instance(1) and attach a VLAN to it (created VLANs).
5. Add the interfaces to instance 1.
6. Delete mstp instance.
7. You will observe errors under platform.log.

Impact:
There is no impact on MSTP behavior and convergence.

Workaround:
None


1890289-1 : Stp stats (ex counters) are not reset when stp mode removed and added again.

Links to More Info: BT1890289

Component: F5OS-A

Symptoms:
Stp stats (ex counters) are not reset to 0 when stp mode removed and added again.

steps
add STP
> stp global config enabled-protocol STP
> stp interfaces <>
> stp stp interfaces <>
remove STP
> no stp stp interfaces
> no stp interfaces
> no stp global config

add stp mode
> stp global config enabled-protocol RSTP
> stp interfaces <>
> stp rstp interfaces <>

check stp states and check "BPDU RECEIVED"
> show stp

old BPDU's counters are not reset to 0.

Conditions:
STP mode is removed and added again.

Impact:
No impact on functionality but you will see old BPDU's counter stats base instead of starting from 0.

Workaround:
There is no impact on functionality but restart of the device will reset the stats counters.


1797681-1 : F5OS device fails to block port based on STP path cost

Links to More Info: BT1797681

Component: F5OS-A

Symptoms:
F5OS fails to change the port to BLOCK based on STP Path Cost.

Conditions:
Large path cost applied to a port that is still in a Forwarding state.

Impact:
The port is not blocked in the STP topology which leads to loop.

Workaround:
None


1778721-2 : PAM faillock data is deleted on restart, allowing users to log in immediately

Links to More Info: BT1778721

Component: F5OS-A

Symptoms:
The administrator can set up the max-login-failures (Number of unsuccessful login attempts allowed before lockout) to a non-zero number. Also, the unlock-timeout can be increased from the default value of 60 seconds. Once the number of failed login attempts is reached, then the user must wait the alotted unlock-timeout period before being allowed to login with the correct credentials. The number of login-failures for each user is currently reset to zero upon a system reboot.

Conditions:
Rebooting simply eliminates the tally count of login failures for all users.

Impact:
The max-login-failures setting is set back to zero if the system is rebooted.

Workaround:
None


1759097-3 : F5OS STP with LAG sends BPDU on single interface regardless of member interface status

Links to More Info: BT1759097

Component: F5OS-A

Symptoms:
BPDU packets are transmitted on only one LAG member interface even when that interface is down.

Traffic does not pass even though everything seems in the correct state.

Conditions:
F5OS system configured with Link Aggregation Groups (LAG).

LAG interfaces participating in Spanning Tree Protocol (STP/RSTP/MSTP).

Multiple physical interfaces configured as LAG members.

One or more LAG member interfaces become disabled or go down.

Impact:
Traffic is disrupted.

Workaround:
None


1712009-3 : Attempting to perform a configuration restore, after downgrading from v1.8.0, makes the system inoperable

Links to More Info: BT1712009

Component: F5OS-A

Symptoms:
After a downgrading from v1.8.0 and reset-to-default process, ConfD fails to start.

Conditions:
Downgrade a system from F5OS-A 1.8.0, F5OS-A-1.8.2, or F5OS-C 1.8.0 to an earlier version, and then attempt to perform a "system database reset-to-default" operation.

Impact:
The system becomes inoperable, with no access to the CLI or UI. Interaction is restricted to a root-level bash login. Following a database reset, access is exclusively available through the serial console.

Workaround:
Must perform this workaround before configuration restore or reset-to-default operation. (If you have done "configuration restore or reset-to-default operation", already encountered the problem, this workaround does not work any more.)

Perform the below steps for a successful configuration restore or reset-to-default operation following a version downgrade from 1.8.0.
=====================================================================================

F5 rSeries system's config-restore workaround after downgrading from v1.8.0
========================================================================
step-1: Log in to the command line interface (CLI) of the system using an account with root access.
step-2: Copy the below content to a new file f5_dyncfg_config_restor_fix.xml

<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->

<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
 
  <restconf>
    <transport>
      <tcp>
        <enabled>false</enabled>
      </tcp>
    </transport>
  </restconf>
 
  <webui>
    <enabled>false</enabled>
      <transport>
        <tcp>
          <enabled>true</enabled>
        </tcp>
      </transport>
    </webui>
 
  </confdConfig>
</config>

<!-- End of file -->

step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/system/
step-4: Execute the below command.

docker exec -it system_manager /confd/bin/confd_load -U -c system -m -l /var/F5/partition/f5_dyncfg_config_restor_fix.xml

step-5: delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml


System Controller’s config-restore workaround after downgrading from v1.8.0
===========================================================================
step-1: Log into the command line interface (CLI) of the Active controller using an account with root access.
step-2: Copy the below content to file f5_dyncfg_config_restor_fix.xml

<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->

<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
 
  <restconf>
    <transport>
      <tcp>
        <enabled>false</enabled>
      </tcp>
    </transport>
  </restconf>
 
  <webui>
    <enabled>false</enabled>
      <transport>
        <tcp>
          <enabled>true</enabled>
        </tcp>
      </transport>
    </webui>
 
  </confdConfig>
</config>

<!-- End of file -->

step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/system/
Step-4: Execute the below command.

docker exec -it vcc-confd confd_load -U -c system -m -l /var/F5/system/f5_dyncfg_config_restor_fix.xml

step-5: Delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml

Chassis Partition's config-restore workaround after Partition downgrading from 1.8.0
==================================================================================
step-1: Log in to the command line interface (CLI) of the blade using an account with root access.
step-2: copy the below content to file f5_dyncfg_config_restor_fix.xml

<!-- File Begin -->
<!-- XML file content for fixing the config-restore issue. -->

<config xmlns='http://tail-f.com/ns/config/1.0'>
<confdConfig xmlns='http://tail-f.com/ns/confd_dyncfg/1.0'>
 
  <restconf>
    <transport>
      <tcp>
        <enabled>false</enabled>
      </tcp>
    </transport>
  </restconf>
 
  <webui>
    <enabled>false</enabled>
      <transport>
        <tcp>
          <enabled>true</enabled>
        </tcp>
      </transport>
    </webui>
 
  </confdConfig>
</config>

<!-- End of file -->

step-3: Move the file (f5_dyncfg_config_restor_fix.xml) created in step-2 to /var/F5/partition<id>/
Step-4: Execute the below command.

docker exec -it partition<id>_manager confd_load -U -c system -m -l f5_dyncfg_config_restor_fix.xml

step-5: Delete the file /var/F5/system/f5_dyncfg_config_restor_fix.xml

Follow the below steps to fix the system after it enters a failed state following a version downgrade v1.8.0
=====================================================================================

To restore functionality, you must access a bash shell using an account with root access (most likely through the system's serial console) and delete the files in the "/var/F5/system/cdb/" directory and perform a restart. This action will erase all settings, including licensing and the system’s management IP.

Next, get a new license, configure the system management IP address, verify or reset the primary key, and initiate a configuration restoration using the previously saved backup.

If the system controller is reset using this method, the empty partitions must be recovered from backup and the tenants must then be restored.

If a partition experiences this type of failure and is cleared and reset, it must not be deleted or recreated in the system controller. This is because it will result in a mismatch of primary keys and the configuration restoration will not function properly.


1627293-2 : GUI session may log out prematurely

Links to More Info: BT1627293

Component: F5OS-A

Symptoms:
When the F5OS Token Lifetime is set to one minute, users may be logged out of the F5OS GUI prematurely.

This setting is located:
- GUI: AUTHENTICATION & ACCESS -> Authentication Settings.
- CLI: system aaa restconf-token config lifetime.

Conditions:
The restconf token is set to less than one minute.

Impact:
If the Token Lifetime is set to one minute it may expire before it has a chance to renew, so the user is logged out.

Workaround:
Use a restconf token time limit of greater than 1 minute.


1624665-2 : ConfD state data shows key and certificate configured for secure (mTLS) even after deleting from config

Links to More Info: BT1624665

Component: F5OS-A

Symptoms:
ConfD operational state data shows key and certificate configured for mutual transport layer security (mTLS) even after deleting them from configuration.

Conditions:
When the exporter is configured with mutual TLS. And then the key and certificate are deleted from the configuration. ConfD operational state data displays the deleted key and certificate for the exporter.

Impact:
No functional impact.

Workaround:
Delete the exporter and reconfigure it again.

Command to delete the exporter from ConfD CLI:

no system telemetry exporters exporter <exporter-name>


1623345-1 : On rSeries system, power cycle reboot might result in QAT device failure

Links to More Info: BT1623345

Component: F5OS-A

Symptoms:
If you enable rate limiting and perform a power cycle reboot,it is possible that some or all of the QAT devices may not be operational. This is because of the sudden power shutdown. To check the rate-limiting status, use the following command.

[root@appliance-1:Active] ~ # su admin <<< "show cluster nodes node node-1 state rate-limiting"
state rate-limiting enabled
[root@appliance-1:Active] ~ #

For the problem occurred QAT devices the SLA allocation commands fail with below console messages when the hardware is coming up from power off/on reboot. You can also check these logs with dmesg command.

[ 134.814182] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.820603] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.826998] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.833369] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.839754] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.846134] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.852479] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.858886] c6xx 0000:55:00.0: Service is not enabled 0


And console is flood with below du_mgr query logs.

[ 5996.156402] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6001.748492] c6xx 0000:54:00.0: Service is not enabled 0
[ 6001.753717] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6007.351849] c6xx 0000:54:00.0: Service is not enabled 0
[ 6007.357079] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6012.965789] c6xx 0000:54:00.0: Service is not enabled 0
[ 6012.971001] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6018.853868] c6xx 0000:54:00.0: Service is not enabled 0
[ 6018.859096] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6024.585181] c6xx 0000:54:00.0: Service is not enabled 0
[ 6024.590401] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6030.197135] c6xx 0000:54:00.0: Service is not enabled 0
[ 6030.202348] c6xx 0000:54:00.0: Failed to query du VF: -22

And the confd table is not populated with rate limiting stats for the tenants deployed.

[root@appliance-1:Active] ~ # su admin <<< " show cluster nodes node node-1 state cryptos "
TENANT ASLA ASLA ASLA SLA SLA SLA
NAME QAT DEVICE NAME BDF MIN USED UTIL MIN USED UTIL
-----------------------------------------------------------------------
mytenant qat_dev_vf08pf04 c6:02.0 - - - - - -
         qat_dev_vf08pf05 c7:02.0 - - - - - -
         qat_dev_vf09pf00 53:02.1 - - - - - -
         qat_dev_vf09pf01 54:02.1 - - - - - -
         qat_dev_vf09pf02 55:02.1 - - - - - -
         qat_dev_vf09pf03 c5:02.1 - - - - - -
         qat_dev_vf09pf04 c6:02.1 - - - - - -
         qat_dev_vf09pf05 c7:02.1 - - - - - -
         qat_dev_vf10pf00 53:02.2 - - - - - -
         qat_dev_vf10pf01 54:02.2 - - - - - -

[root@appliance-1:Active] ~ #

Conditions:
The issue might occur in a power cycle reboot of the rSeries F5OS-A system with multiple tenants deployed. The below logs are observed on the console when this occurred. To check the logs, use the dmesg command.

[ 134.814182] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.820603] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.826998] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.833369] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.839754] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.846134] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.852479] c6xx 0000:55:00.0: Service is not enabled 0
[ 134.858886] c6xx 0000:55:00.0: Service is not enabled 0

Impact:
QAT devices may encounter an issue where Rate Limiting does not function properly for tenants deployed on the rSeries host. The Rate Limiting stats do not get updated in the ConfD and results in the console being flooded with error logs.

The logs can also be viewed using the dmesg command.

[ 5996.156402] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6001.748492] c6xx 0000:54:00.0: Service is not enabled 0
[ 6001.753717] c6xx 0000:54:00.0: Failed to query du VF: -22
[ 6007.351849] c6xx 0000:54:00.0: Service is not enabled 0

Workaround:
Rebooting the appliance will solve the issue caused by the malfunctioning QAT devices.


1623101-1 : External OTEL server receives log data for both the platform and event logs, even if only one of them has been configured

Links to More Info: BT1623101

Component: F5OS-A

Symptoms:
The configured OTEL exporter receives log data from both platform-log and event log, even when only one of them is configured.

Conditions:
This occurs when you configure one telemetry exporter with only either of “platform-log” or “event-log” instruments and another telemetry exporter with “all” or “logs” or both “[platform-log event-log]” instruments.

Impact:
The telemetry exporter configured to receive only platform-log or event-log instrument data will receive data from both log instruments.

Workaround:
None


1622869-2 : Might see TPOB core after HA disassembly

Links to More Info: BT1622869

Component: F5OS-A

Symptoms:
TPOB container might crash after performing BIG-IP Next-HA disassembly operation.

Conditions:
-- BIG-IP Next in a HA pair
-- The HA pair is disassembled and factory reset

Impact:
No impact, as the container gets re-created

Workaround:
None


1621917 : Stale VFIO devices entries upon BIG-IP Next Tenant deletion

Links to More Info: BT1621917

Component: F5OS-A

Symptoms:
On several occasions, when deleting a BIG-IP Next Tenant, the system did not properly clean up and left behind outdated entries in the /var/F5/system/tenants/ folder, which includes symlinks to the VFIO devices.

Conditions:
During BIG-IP Next tenant deletion

Impact:
System downgrades to versions less than 1.8.0 will not be allowed.

Workaround:
Login to the system with root credentials and manually delete the stale entries in /var/F5/system/tenants/.


1621785-1 : Mstp topology convergence after changing the priority of instance is not taking place.

Component: F5OS-A

Symptoms:
Modifying port priorities after configuring the MSTI instances, is not changing the bridge port roles.

Conditions:
Configure MSTI
1. Create VLANs.
2. Attach VLANs to the interfaces.
3. Enable MSTP using webUI. Select Network Settings > STP configuration and select MSTP.
4. Create an instance(1) and attach a VLAN to it (created VLANs).
5. Add the interfaces to instance 1.
5. Once MSTP is converged, modify the bridge priority to make the F5OS device the root.
6. Observe that F5OS device failed to become root.

Impact:
MSTP convergence not happening after updating port roles.

Workaround:
Restarting the container from confD using the command

“system diagnostics, os-utils docker restart node platform service system_stpd “, resolves the issue by revising topology changes and assigning proper port roles.


1621769-1 : Observing FPGA errors when VLAN cannot configured for the interface and VLAN state is not set up

Component: F5OS-A

Symptoms:
FPGA error logs are observed for interfaces that are not configured in the MSTP instance.

Conditions:
1. Create VLANs.
2. Attach VLANs to the interfaces.
3. Enable MSTP using webUI. Select Network Settings > STP configuration and select MSTP.
4. Create an instance(1) and attach a VLAN to it (created VLANs).
5. Add the interfaces to instance 1.
6. You will observe errors under platform.log.

Impact:
There is no impact on MSTP behaviour and convergence.

Workaround:
None


1621757-1 : Observing "Stp Maapi request to readPortFlushes failed" errors while enabling MSTP port

Component: F5OS-A

Symptoms:
MSTP port flush failed when configuring instance.

Conditions:
1. Create VLANs.
2. Attach VLANs to interfaces.
3. Enable MSTP using GUI. Network settings > STP Configuration - MSTP
4. Create an instance and attach a VLAN to it (created VLANs).
5. Observed errors under platform.log and /var/log/messages.

Impact:
No major impact on MSTP topology.

Workaround:
None


1621449-1 : Error related to removal of orphan pod related subpaths in /var/log/messages

Component: F5OS-A

Symptoms:
No functionality issue
log dump with error device or resource busy in /var/log/messages

Conditions:
Upgrading from F5OS-A 1.8.0 or lower version to later versions

Impact:
No functional impact

Workaround:
"umount <path>", here the path refers to the one which failed to get removed.

For example

2024-07-29T11:02:24.876704+00:00 appliance-1.chassis.local k3s: E0729 11:02:24.875805 19711 kubelet_volumes.go:180] "There were many similar errors. Turn up verbosity to see them." err="orphaned pod \"7023f856-efff-4f17-8b2d-c794627021e8\" found, but failed to remove subpath at path /var/lib/kubelet/pods/7023f856-efff-4f17-8b2d-c794627021e8/volume-subpaths/sdag-volume/f5-fsm-tmm/11: remove /var/lib/kubelet/pods/7023f856-efff-4f17-8b2d-c794627021e8/volume-subpaths/sdag-volume/f5-fsm-tmm/11: device or resource busy" numErrs=1

Here is the workaround for the above error:

umount /var/lib/kubelet/pods/7023f856-efff-4f17-8b2d-c794627021e8/volume-subpaths/sdag-volume/f5-fsm-tmm/11


For non-root user, system reboot is another workaround, however it impacts the tenants functionality, so it is important to exercise it cautiously.


1620597 : Reset counter functionality not working properly on rSeries platforms

Links to More Info: BT1620597

Component: F5OS-A

Symptoms:
On rSeries appliances, interface counters will be reset briefly but then revert to the previous values. This behavior occurs within both LAG (Link Aggregation Group) and individual interfaces, affecting the accuracy of network statistics and troubleshooting efforts.

Conditions:
Execute the "reset counters all" or equivalent command. The counters briefly reset before reverting to their previous values.

Impact:
The issue impacts the accuracy of interface statistics displayed in the GUI section under "Network -> Network Details." When you reset counters for a specific interface, only the "Out" counters are successfully reset to 0, while the "In" counters remain unchanged or continue increasing. This cause confusion or incorrect reporting during network diagnostics or performance monitoring.

Workaround:
None


1619925-1 : Tenant disk utilization stats fail to clear after deleting the tenant.

Links to More Info: BT1619925

Component: F5OS-A

Symptoms:
Statistical information of the tenant is observed after the tenant is deleted.

Conditions:
A tenant is deleted.

Impact:
Executing the command "show tenant tenants show deleted tenant statistics" in the ConfD displays the tenant statistics.

Workaround:
Rebooting system will remove the information for the deleted tenant.


1614333 : OPT-0054-01, Innolight (TR-PY13L-NF5, Rev ‘R1A’) optic experiencing intermittent link problems when connected to r2000/r4000 port 5.0

Links to More Info: BT1614333

Component: F5OS-A

Symptoms:
OPT-0054-01, Innolight (TR-PY13L-NF5, Rev ‘R1A’) optic experiencing intermittent link problems when connected to r2000/r4000 Port 5.0.

Enter the following command in ConfD to display the optic on port 5.0:
show portgroups portgroup 5

Output of the following commands indicate the interface is down and not detected:
- show interfaces interface 5.0
- ethtool sfp_5

Conditions:
Inserting the Innolight “R1A” optic into port #5 of a r2000/r4000.

Impact:
Port #5 does not become active; speed & duplex are reported as unknown.

Workaround:
F5 recommends you use one of the following optics in place of the OPT-0054-01 Innolight rev R1A:
- OPT-0054-01 Finisar/IR-VI (FTLF1436P3BCL-F5, Rev ‘RA1’) optic.
- OPT-0054-01 Innolight rev R2C

To identify the OPT-0054-01 Innolight (TR-PY13L-NF5, Rev ‘R1A’) optic, use the revision number. For more information, refer to the example in K000140617 at https://my.f5.com/manage/s/article/K000140617: Verify the right optics module to install on your F5OS system.


1612429 : License installation is not working with HTTPS Proxy server

Links to More Info: BT1612429

Component: F5OS-A

Symptoms:
License installation is not working with SSL-enabled proxy server.

Conditions:
The SSL-enabled proxy server is unable to perform an SSL handshake when installing a license through a proxy server.

Impact:
License installation will fail with proxy server.

Workaround:
Install the license manually or use an HTTP proxy.


1612101-1 : When vCPU cores configuration changed for BIG-IP Next tenant, RRD stats shows both the old and new CPU data stats

Links to More Info: BT1612101

Component: F5OS-A

Symptoms:
The RRD stats display the data for old and new CPU cores. You can match the new CPU cores and validate the data. The old CPU cores data is invalid and should not be displayed.

Conditions:
When user configures BIG-IP Next tenant and changes the vCPU cores.

Impact:
No Functional Impact. Both old and new data stats appear for cpu-stats in RRD. However, data streaming works as expected.

Workaround:
None


1603685-1 : ISO import status is stuck at verifying and ISO removal does not remove the ISO from /var/import/staging

Component: F5OS-A

Symptoms:
ISO import status will be stuck at verifying. When attempting to remove an ISO from the CLI/GUI, the ISO will be deleted from ConfD, but will remain in the system’s /var/import/staging directory.

Conditions:
No specific condition.

Impact:
The ISO is stuck at verifying. Hence, an upgrade to the ISO can not be done.

Workaround:
1. Restart sw-mgmt.service.
   systemctl restart sw-mgmt.service
2. Restart system-image-agent container.
   docker restart system_image_agent

OR

Reboot the device.


1603669-1 : Show services command shows stale entries for deleted tenants

Links to More Info: BT1603669

Component: F5OS-A

Symptoms:
After deploying many tenants (100+) in the configured state and then rapidly deleting them, the 'show tenants' command will show deleted tenants.

Conditions:
-- Deleting a large list of tenants via a script that does not wait in between deletion commands.

Impact:
The show tenants command shows stale entries.

Workaround:
Add a sleep of 3 seconds after each commit when deleting a tenant.


1600949 : Tenant status is not accurate when the F5OS upgrade is in progress

Component: F5OS-A

Symptoms:
The “show tenants” data is not updated properly when the firmware upgrade is in progress.

Conditions:
During upgrade, if “show system install status” shows in progress, the data is not updated as k3s is not turned up completely.

Impact:
No functional impact. Users should get accurate data once the firmware installation is complete. You can refer to “show tenants” data post system upgrade is completed.

Workaround:
Wait until the upgrade activity is completed.


1594149 : Next Tenant Management interface is turned down/unreachable

Component: F5OS-A

Symptoms:
A BIG-IP Next Tenant Management Interface remains down.

Conditions:
-- VELOS or rSeries is the host
-- The maximum number BIG-IP tenants are deployed
-- Some tenants are deleted
-- Some BIG-IP Next tenants are simultaneously deployed

This can cause the new tenant to have the same MAC address as the tenant that is still shutting down, and the interface will not be marked up.

Impact:
1. BIG-IP Next tenant's management interface will remain down.
2. Tenant will be unreachable.

Workaround:
1. Move the affected tenant from Configured to Deployed
2. Rebooting the system Also fixes the as it will Delete and create the interface again.


1591961-1 : Observing "Failed to send restarting msg to VF" errors during reboot

Component: F5OS-A

Symptoms:
This error “Failed to send restarting msg to VF” appears during reboot and causes a delay in reboot.

Conditions:
When two or more BIG-IP tenants are deployed.

Impact:
Delay in reboot time.

Workaround:
None


1589161 : Observing kube-dns service error log flood in /var/log/messages after appliance downgrade

Links to More Info: BT1589161

Component: F5OS-A

Symptoms:
By performing appliance downgrade from F5OS-A 1.7.0/F5OS-A 1.8.0 to any lower versions than F5OS-A 1.7.0, a log flood with below error is seen in /var/log/messages.

level=error msg="Failed to process config: failed to process /var/lib/rancher/k3s/server/manifests/corednsfile.yaml: failed to update kube-system/kube-dns /v1, Kind=Service for kube-system/corednsfile: Service \"kube-dns\" is invalid: spec.clusterIPs[0]: Invalid value: []string(nil): primary clusterIP can not be unset"

Conditions:
When downgrade is performed from F5OS-A 1.7.0/F5OS-A 1.8.0 to any lower versions than F5OS-A 1.7.0, an error log flood related to kube-dns service is seen in /var/log/messages.

Impact:
No functional impact, expect the log flood for once in every 15 seconds.

Workaround:
Execute the below command on the appliance:
“kubectl delete svc kube-dns -n kube-system”.


1587569-1 : Every tenant receives the traffic of all other tenants if VLAN is shared across

Component: F5OS-A

Symptoms:
This is a product limitation in F5OS-A on r2000 and r4000 based systems.

Conditions:
Assigning an identical VLAN to two different tenants.

Impact:
Every tenant receives the traffic of all other tenants.

Workaround:
None.


1586089 : Resource-admin is unable to perform SCP.

Links to More Info: BT1586089

Component: F5OS-A

Symptoms:
Resource-admin is unable to perform SCP.

Conditions:
When trying to use SCP with resource-admin for the available virtual paths.

Impact:
Resource-admin cannot perform SCP file transfers.

Workaround:
Though SCP fails, the file upload/download API works for file upload/downloads.


1585609-1 : rSeries tenant silent reboot; Tenant liveness probes failed

Component: F5OS-A

Symptoms:
Tenant pod is restarted with following error - ‘Liveness probe failed’.

Conditions:
K3s failed to perform successful liveness probes for four times consecutively.

Impact:
As a recovery mechanism, K3s will restart the pod and lower downtime of the tenant is expected.

Workaround:
K3s will automatically restart the pod and no action is expected from the user.


1585373-2 : Outdated or old Service-Instances for tenant in rSeries platforms

Links to More Info: BT1585373

Component: F5OS-A

Symptoms:
When running the 'show service-instances' command in confd, the service-instances table contains a large number of outdated or old entries.

Conditions:
-- F5 rSeries r5k, r10k or r12k platform
-- BIG-IP NEXT tenants are repeatedly restarted

Impact:
Datapath connectivity to the tenant can be impacted.

Workaround:
Reboot the appliance to clear the issue.


1585237 : When telemetry exporter is not reachable, logs to enable send_queue or retry will be printed in platform.log

Links to More Info: BT1585237

Component: F5OS-A

Symptoms:
When telemetry exporter is not reachable, logs to enable send_queue or retry will be printed in platform.log.

Conditions:
Logs will be printed only when configured telemetry exporter is not reachable.

Impact:
No functional impact.

Workaround:
Ensure the exporter is reachable.


1575953-1 : BIG-IP NEXT tenant stuck at provisioning state with live upgrade when tenant bring-up is in progress

Component: F5OS-A

Symptoms:
During the BIG-IP NEXT tenant bring-up process, performing a live upgrade will result in the BIG-IP Next tenant being unable to complete the provisioning state.

Conditions:
1. PXE install version v1.8.0.
2. Configure appliance network, DNS, and install license.
3. Downgrade to version v1.7.0 (validate, if you observe rollback-related commands)
4. Upgrade the device to version v1.8.0 and deploy BIG-IP tenant
5. Validate datapath on BIG-IP tenant and deploy BIG-IP NEXT tenant with image (BIG-IP-Next-20.2.1-2.389.6.tar.bundle)
6. While the BIG-IP NEXT tenant bring-up is in progress, live upgrade the box to v1.8.0 build.
7. Observe the next tenant status.

Impact:
BIG-IP NEXT tenant is stuck at provisioning state after live upgrade, while tenant bring-up is in progress.

Workaround:
Restart the tenant. For example, toggling the tenant states (Move tenant to configure state and again deployed state).


1575433-2 : "ReadyRequest failed for 'system_fpga' @ 'tcp://127.0.0.1:1060', Inner -> 'receive timeout'" logs are being seen couple of times a day

Component: F5OS-A

Symptoms:
Observe "ReadyRequest failed for 'system_fpga' @ 'tcp://127.0.0.1:1060', Inner -> 'receive timeout'" logs couple of times a day in platform.log

Conditions:
ReadyRequest for the service ‘system_fpga’ times out

Impact:
Alarming log messages are repeatedly displayed. These logs can be ignored.

Workaround:
None


1574773-1 : On rSeries system, operations which involve reboot, might result in Tenant failure state

Component: F5OS-A

Symptoms:
After reboot of the F5OS-A rSeries system in any operations (for example, live upgrade, reboot) with multiple tenants deployed, some or all of the tenants might not come to operational. This is due to the vfio device problem. With this the tenant pods get into restarting loop and never comes up.

The tenant pod state can be checked with the below command on the host system.

[root@appliance-1:Active] vfio # kubectl get pods
NAME READY STATUS RESTARTS AGE
f5-resource-manager-bpnrr 1/1 Running 0 3h
virt-launcher-bigip-14-1-kz56l 1/1 Running 0 3h4m
virt-launcher-bigip-19-1-5m72j 1/1 Running 0 3h4m
virt-launcher-bigip-3-1-pn6c2 1/1 Running 0 3h4m
virt-launcher-bigip-4-1-8x4cc 1/1 Running 0 3h4m
virt-launcher-bigip-20-1-q99b7 1/1 Running 0 3h4m
virt-launcher-bigip-5-1-vr4cf 1/1 Running 0 3h4m
virt-launcher-bigip-18-1-zfrns 1/1 Running 0 162m
virt-launcher-bigip-1-1-qhjd5 1/1 Terminating 0 4m8s
virt-launcher-bigip-13-1-vjwwd 1/1 Terminating 0 3m19s
virt-launcher-bigip-12-1-7swfq 0/1 Completed 0 87s
virt-launcher-bigip-16-1-pqjx6 1/1 Running 0 43s
virt-launcher-bigip-15-1-56x2g 0/1 PodInitializing 0 5s
[root@appliance-1:Active] vfio #

Conditions:
WThe issue might occur in a live software upgrade or any situation that involves a reboot of the rSeries F5OS-A system with multiple tenants deployed.

The below logs will be observed in issue occurring pod logs repeatedly for every retry of the vfio device access by qemu-kvm.

[root@appliance-1:Active] # kubectl get pods, this command shows the pod name. You can use the following command to see the log in the problem pod. Hash in the pod name changes for every restart of the pod.

[root@appliance-1:Active] # kubectl logs <<Problem Pod name displayed in above command>> | grep busy

qemu-kvm: -device vfio-pci,host=0000:54:02.1,id=hostdev0,bus=pci.10,addr=0x0: vfio 0000:54:02.1: failed to open /dev/vfio/130: Device or resource busy

Impact:
Some or all of the vfio devices are the problem, which results in some or all tenants deployed on the rSeries host do not work as expected. They do not change to a RUNNING state.

Workaround:
As the vfio devices are in problem state, a reboot of appliance will resolve the issue.


1568485-2 : GRE V1 packets are being dropped before even reaching BIG-IP on F5 r2xxx/r4xxx

Links to More Info: BT1568485

Component: F5OS-A

Symptoms:
GRE V1 packets are dropped at the Intel E810 Firmware before reaching BIG-IP tenant on F5 r2xxx/r4xxx platforms.

Conditions:
When GRE V1 packets are received to BIG-IP tenants running on F5 r2xxx/r4xxx platforms.

Impact:
GRE V1 traffic will not be reaching BIG-IP tenants on F5 r2xxx/r4xxx platforms.

Workaround:
None


1566917-2 : The ha-1-deployment pod may get restarted after HA setup and system upgrades

Component: F5OS-A

Symptoms:
When HA is configured on the BIG-IP Next tenants, a new pod name <tenant-name>ha-1-deployment-<replica-set-hash>-<pod-id> will be created in the tenant namespace.

In some cases, the pod restart count may be 1 or 5.

Conditions:
When HA is set up on BIG-IP Next tenants on rSeries and after upgrading F5OS 1.7.0 to F5OS 1.8.0 version.

Impact:
No functional impact. The pod will automatically transition to a running state.

Workaround:
NoneThe


1552921 : Password policy option reject-username set to false has no effect

Links to More Info: BT1552921

Component: F5OS-A

Symptoms:
When the administrator configures 'system aaa password-policy config reject-username false', F5OS will still reject passwords that contain the username.

Conditions:
System aaa password-policy config reject-username is set to false

Impact:
When a user tries to set or change a password containing their username in any part of the password, F5OS will reject that password.

Workaround:
Do not use passwords that contain the username.


1505497-3 : During remote logging server configuration, selectors help menu does not display when using Tab key.

Component: F5OS-A

Symptoms:
While configuring the remote logging server, using the Tab key does not display selector help menu.

Conditions:
While configuring the remote logging server, using the Tab key does not display selector help menu.

Impact:
No help menu is displayed

Workaround:
Use ? key to get help in selectors menu, while configuring remote server.


1491209-1 : Non-root, local authentication fails when LDAP is configured with chase referrals and an invalid DNS server is configured

Links to More Info: BT1491209

Component: F5OS-A

Symptoms:
Local and remote authentication to F5OS will timeout and fail. Running commands as root may take 60 seconds before each command returns.

Conditions:
LDAP authentication is configured with chase-referrals set to true and an invalid or non-responsive DNS server is also configured.

Impact:
Users cannot successfully authenticate via the GUI. Local admin users cannot successfully authenticate. Logging in as root takes 2 minutes and many system commands will take at least 60 seconds to complete.

Workaround:
Set 'system aaa authentication ldap chase-referrals false' or ensure a working DNS server is always configured.


1490621-1 : Snmpv1 traps have a agent-addr set to 0.0.0.0 instead of a management IP

Links to More Info: BT1490621

Component: F5OS-A

Symptoms:
When SNMP V1 version is configured for SNMP Traps monitoring, the received traps will have the agent-address as 0.0.0.0 instead of system's mgmt ip. This is issue with only SNMP v1 version traps.

Conditions:
SNMP V1 version traps will have the agent-address as 0.0.0.0 and the remaining trap oid values are proper.

Impact:
User can't see the system's mgmt ip address in SNMP V1 version trap's agent-address field.

Workaround:
F5OS suggest to use SNMP V2 version for monitoring SNMP Traps which will populate the IP address correctly with system's mgmt IP.


1469485-1 : "show components component state memory full" does not have any meaningful output

Links to More Info: BT1469485

Component: F5OS-A

Symptoms:
The 'full' command displayed under 'show components component state memory' does not have any meaningful output.

Conditions:
When the user runs the command 'show components component state memory full', there is no output generated.

Impact:
No functional impact.

Workaround:
None


1399129 : Duplicate platform agent log entries when tenant starts

Links to More Info: BT1399129

Component: F5OS-A

Symptoms:
Multiple f5-platform-agent.log messages may be seen for cluster subscribe: API client already subscribed.

Conditions:
The BIG-IP Next tenant is starting on rSeries hardware.

Impact:
No functional issue, tenant starts as expected.

Workaround:
None


1390485 : Calendar navigator skips one month

Component: F5OS-A

Symptoms:
On the "Time Settings" screen, when using the calendar navigator to "Set Time & Date", the navigation arrows for the next month skips one month.

Conditions:
Using the navigation arrow when the currently selected date is the 31st of a month and the next month has only 30 days.

Impact:
If the user wants to make a selection in the next month while the current selection is the 31st of a month, they will not be able to do that in the first go with the navigation arrow.

Workaround:
Users will be able to navigate to the desired month by using the back arrow.


1381237-2 : Messages like "Failed to set up mount unit" may flood in /var/log/messages file

Component: F5OS-A

Symptoms:
This occurs when a BIG-IP Next tenant is deployed on rSeries platforms while generating QKView files on the host (F5OS-A). Messages like "Failed to set up mount unit: Invalid argument" may flood in /var/log/messages file.

Conditions:
When a BIG-IP Next tenant is deployed and QKView files on the host (F5OS-A) are generated.

Impact:
Log messages with pattern "systemd: Failed to set up mount unit: Invalid argument" in /var/log/messages are flooded for 10-20 seconds.

Workaround:
Log messages are flooded while QKView files are generating for 10-20 seconds. After this, the flooding stops.


1381053 : Cluster IP is unavailable for some time during tenant reboot

Links to More Info: BT1381053

Component: F5OS-A

Symptoms:
Cluster IP/Floating IP becomes inactive, causing API calls failure temporarily.

Conditions:
Intermittently when the system/tenant is rebooted.
When tenant running-state is toggled (deployed->configured->deployed).

Impact:
API calls are failing temporarily. CM will not be able to get the status of the HA.

Workaround:
1. Login to the rSeries device on which the current ACTIVE HA node is running.
2. execute the below command with appropriate changes,
docker exec -it node-agent arping -q -c 5 -W 0.01 -U -P -I <tenant mgmt interface> -S <tenant mgmt VIP> <tenant mgmt VIP>
tenant-mgmt interface can be found using 'ip a s | grep mgmt' on the root.


1380705 : BIG-IP tenant is stuck during boot up after doing tenant upgrade from 15.1.x to 17.1.x

Component: F5OS-A

Symptoms:
When F5OS reboots followed by a tenant upgrade from 15.1.x to 17.1.x, the tenants are getting stuck in boot up. This is applicable for both FIPS and normal license.

Symptoms:
[ 183.888473] [ OK ] Started dracut initqueue hook.
[ OK ] Reached target Remote File Systems (Pre).
[ OK ] Reached target Remote File Systems.
dracut-initqueue[251]: Warning: dracut-initqueue timeout - starting timeout scripts
[* ] A start job is running for dev-disk...54e.device (3min 36s / no limit)

The problem does not occur in all the deployed tenants. The main cause is that the BIG-IP tenant fails to boot when its LVM cache/metadata is not synced or is corrupted.

Conditions:
Host reboots followed by guest upgrade.
Tenants get rebooted and retain LVM info, the host gets rebooted, and tenants lose LVM info. There is a timing issue for LVM caching.

Impact:
Datapath and tenant configuration will be lost.

Workaround:
No workaround except recovery of the tenant. To recover the tenant we need manual intervention. We need to enter Maintenance mode, recover the LVMs, and reboot.

Booting into TMOS Maintenance:

Easiest way to do this is
in one window
  while [ 1 ];do virtctl console cbip-tenant1-1 -n default;done
 
in another window
 ps auxww|grep cbip-tenant1-1
 kill that qemu pid
 
Then go back to the console window in the grub menu and select maintenance and execute vgcfgrestore

Please note this is not full proof.


1378917-2 : FIPS partition details are not seen in the tenant console when it is configured without waiting until its status is 'Running'

Component: F5OS-A

Symptoms:
FIPS partition details are not seen after connecting to the tenant console when it is configured without waiting until its status is 'Running.'

Conditions:
Ensure the tenant is deployed and the running-state is changed to 'configured.' Then, change the running-state to 'deployed' along with the FIPS partition details without waiting for tenant to start.

Impact:
The tenant does not show the FIPS partition details.

Workaround:
Wait until the tenant comes up and either change the configuration or redeploy the tenant with the required configuration.


1377629-2 : Failed to ping tenant mgmt-ip

Component: F5OS-A

Symptoms:
Failed to ping tenant mgmt-ip.

Existing and deployed tenant config mismatch.

Conditions:
When the user modifies tenant config and moves the tenant to Deployed state before the old tenant instance gets cleaned up completely.

Impact:
Tenant will be running with old config and will not be able to ping tenant mgmt-ip.

Workaround:
Move the tenant to configured state and once tenant is terminated completely, move it to deployed state.


1338645-2 : R2000/R4000 silent reboot

Links to More Info: K000151762, BT1338645

Component: F5OS-A

Symptoms:
R2xxx/R4xxx system experiences a silent reboot.
This is caused by a compatibility issue between the system and the solid-state storage device.

Conditions:
NVME fails to initialize after multiple reboots.

(1) The following matching signature is found in the system event log:
Ex:
MCA Error-Reporting Registers Capture. Bank: 6 Core: 0 STATUS Register: 0x0419 Value: 0xb980000000000e0b
MCA Error-Reporting Registers Capture. Bank: 6 Core: 0 MISC Register: 0x041b Value: 0x0000000000180000

(2) The NVME SSD installed in the system is a 480GB Micron NVME SSD, model 7450_MTFDKBA480TFR .
ex: Model: Micron_7450_MTFDKBA480TFR

Impact:
1.System will reboot by its own
2.System is unresponsive

Workaround:
Follow the workaround steps described in K000151762: rSeries 2000/4000 systems with NVME SSD may fail to initialize after multiple reboots, available at https://my.f5.com/manage/s/article/K000151762


1338557 : VM events are not captured inside the log file

Links to More Info: BT1338557

Component: F5OS-A

Symptoms:
The VM logs seen on kubernetes events will not be recorded in the log file. The log file k3s_events is helpful in identifying the life cycle of the VM.

Conditions:
K3s events related to BIG-IP VM are not captured in k3s_events log.

Impact:
No functional impact.

Workaround:
None


1327229-2 : Some nuisance messages are sent to the platform log after every authentication configuration change

Component: F5OS-A

Symptoms:
Messages similar to the following may be added to the platform log after every authentication configuration change:

2023-08-03T09:43:49.150901+00:00 appliance-1 authd[8]: priority="Info" version=1.0 msgid=0x3901000000000149 msg="System's IPv6 management address isn't configured.".
2023-08-03T09:43:49.157934+00:00 appliance-1 authd[8]: priority="Info" version=1.0 msgid=0x3901000000000092 msg="LDAP server:" server="ldap://ldapserver.example.com:389".
2023-08-03T09:43:49.157951+00:00 appliance-1 authd[8]: priority="Info" version=1.0 msgid=0x3901000000000096 msg="LDAP SSL:" ssl="off".

Conditions:
The user makes a change in system aaa authentication.

Impact:
There are nuisance messages in the platform log.

Workaround:
N/A


1326021-2 : Corrupted state of data plane in r5600 can result in egress packet corruption

Links to More Info: BT1326021

Component: F5OS-A

Symptoms:
Networking connectivity issues, such as ARP resolution issues, high availability (HA) failures, health monitor instability, etc. Packet captures with Wireshark or tshark can be used to show bit-errors/corruption in the network packet for traffic passing through the data plane. This corruption can occur in various parts of the packet such as the MAC address, EtherType, packet checksums, etc. Corresponding spike in bad_ifh_crc_drop counter value.

Conditions:
Rare condition that can affect r5600 platform.

Impact:
Network connectivity problems on some traffic passing through the affected data plane. Could be reflected in the status of Config Sync or more health monitors down on one member of HA pair.

Workaround:
Reboot the r5600 to reload the bitfile. If the bitfile reload does not resolve the issue, then its most likely a hardware issue. Please work with Support on a RMA.


1320853 : Config restore fails on system with lower size if the tenant is deployed with max size on original system

Links to More Info: BT1320853

Component: F5OS-A

Symptoms:
If a tenant is deployed with maximum storage size on a system, and the same configuration is tried to restore on another system with lesser disk space compared to the original device, the configuration restore fails.

Conditions:
* Tenant deployed with maximum storage size.
* Restoring the configuration across the devices with different disk sizes.

Impact:
Configuration restore fails.

Workaround:
Edit the configuration backup file and adjust the tenant size as per the target system.

Note: There could be other workarounds.


1273013-3 : Five percent (5%) deviation can be observed in TPS performance on R10920 and R5920 tenant

Component: F5OS-A

Symptoms:
On R10920 and R5920 tenants, the TPS performance degradation may be observed up to 5%.

Conditions:
When the R10920 and R5920 tenant is deployed.

Impact:
TPS performance may be degraded by 5%.

Workaround:
N/A


1253717 : iavf driver crashes intermittently on r2000 or r4000 systems during system reboot

Links to More Info: BT1253717

Component: F5OS-A

Symptoms:
When the r2000/r4000 system goes down during reboot, a crash of iavf driver is seen on the system console intermittently. This crash occurs due to multiple calls to the same function that releases the network devices inside iavf driver code.

Conditions:
Occurs intermittently on r2000/r4000 systems that use iavf drivers to manage datapath network devices/ports when the system is rebooting.

Impact:
No functional impact.

Workaround:
N/A


1224113-2 : IPV6 packets are fragmented on R2x00/R4x00 platforms.

Component: F5OS-A

Symptoms:
IPv6 packets are fragmented on R2x00/R4x00 platforms, which causes a slight performance degrade.

Conditions:
Fragmentation is seen for IPv6 packets.

Impact:
Performance is degraded when passing IPv6 traffic. There is not any functionality impact because of this issue other than the performance impact.

Workaround:
N/A


1222721 : Deletion of STP configuration using "no stp" is failing

Links to More Info: BT1222721

Component: F5OS-A

Symptoms:
"no stp" is failing with below error
Aborted: 'stp rstp config' : IEEE Std 802.1Q-2018: A Bridge shall enforce the following relationships:

Due to this, user cannot delete/disable STP with a single comamnd.

Conditions:
In case of VELOS paltforms, "no stp" will fail with error.

Impact:
User will not be able to delete/disable STP configuration with single command "no stp".

Workaround:
Except below configurations, all other configurations can be deleted.
1)no stp rstp config
2)no stp stp config
3)no stp mstp config


1195201-3 : Missing/defective DIMM not reported sufficiently to end user

Links to More Info: BT1195201

Component: F5OS-A

Symptoms:
If a memory DIMM is missing or defective, the system does not report the situation sufficiently to the user through the "show system health" API.

Conditions:
A memory DIMM becomes missing or defective.

Impact:
The platform is operating at less than the shipped memory configuration, which could impact the number of tenants deployed on a system.

Workaround:
Refer to the AOM PEL log for details of the missing and/or defective DIMM.


1112317-1 : Null bytes or non-ascii characters are present in velos.log

Links to More Info: BT1112317

Component: F5OS-A

Symptoms:
Null bytes are created in the log files.

Conditions:
Abrupt restarts may cause this issue.

Impact:
Grep considers the log file as a binary file.

Workaround:
Use ‘-a’ option in grep command.


1083921-2 : VLAN name change is not allowed once a tenant is launched

Component: F5OS-A

Symptoms:
When you change the VLAN name on a rseries (R2x00 or R4x00) Appliance, the BIG-IP tenant does not honor the name change.

Conditions:
-- One or more tenants are running on a rSeries (R4x00 or R2x00) platform.
-- A VLAN name is changed for a VLAN that is in use by a running tenant.

Impact:
Changing the VLAN name after a tenant is launched and reassigning that VLAN removes the interface in TMM.

Workaround:
Set the VLAN name to the initial name that the tenant used when it was launched. Or, if you need to change the name of the VLAN, delete the tenant and redeploy.


1083061-2 : Loading saved config to BIG-IP fails if host modifications are made after "tmsh save sys config"

Component: F5OS-A

Symptoms:
The configuration load fails with an error similar to the following:

01070257:3: Requested VLAN member (1.5) is currently a trunk member
Unexpected Error: Loading configuration process failed.

Conditions:
-- rSeries 4x00 or R2x00 platform
-- Configuration is backed up using tmsh
-- A change is made to one or more VLANs, interfaces, trunks, or type of VLANs on the host
-- The BIG-IP system loads the configuration

Impact:
Configuration load fails.

Workaround:
On a failure while loading sys config, open the affected configuration file, fix the object that was changed manually, and retry loading the sys config.

For example, if the load sys config at mcpd complains about "vlan member 1.x" is not found on vlan-xyz then open /config/bigip_xxx.conf file and update the vlan-xyz with vlan-member 1.x and retry the config load.


1080437-2 : VerifyDmesg test failure

Component: F5OS-A

Symptoms:
An error message is seen as dmesg output:

Failed to allocate irq -2147483648: -107

Conditions:
The error message is seen sometimes when restarting/rebooting device is complete.

Impact:
The error message does not impact any functionality as after the allocation of irq for SMBUS is failed, it would switch to polling mode.

Workaround:
NA


1063649-2 : Changing the system date to be older than the installation date is not supported.

Component: F5OS-A

Symptoms:
All system self-signed certificates are generated using the installation system date. Changing the date to an older date than the installation date can cause instability.

Conditions:
Setting the system date to be older than the installation date on an rSeries appliance.

Impact:
System goes to unstable state.

Workaround:
N/A




This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade


*********************** NOTICE ***********************

For additional support resources and technical documentation, see:
******************************************************