Bug ID 1059337: Potential data leak inside Ethernet padding field on VELOS architecture products

Last Modified: Mar 30, 2024

Affected Product(s):
BIG-IP All(all modules)

Known Affected Versions:
14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6, 15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 15.1.3, 15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 15.1.6.1, 15.1.7, 15.1.8, 15.1.8.1, 15.1.8.2

Fixed In:
17.1.0, 15.1.9

Opened: Nov 02, 2021

Severity: 3-Major

Symptoms

Padding bytes added by TMM to bring packets up to the minimum Ethernet frame length of 64 bytes may contain contents of TMM's CPU memory.

Impact

Unintentional leak of TMM memory contents in Ethernet padding on VELOS architecture platforms.

Conditions

Issue can occur whenever TMM creates a packet that is shorter than the 64 byte Ethernet minimum transmitted on a VELOS architecture platform.

Workaround

Upgrade to latest BIG-IP version.

Fix Information

Ethernet minimum frame padding explicitly zeroed by TMM's data path driver used on VELOS architecture products.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips