Bug ID 483653: In some traffic situations, virtuals using SSL can excessively buffer client data instead of closing the TCP window

Last Modified: Oct 16, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6

Fixed In:
12.0.0, 11.6.3, 11.4.1 HF9

Opened: Oct 09, 2014

Severity: 3-Major

Symptoms

In some traffic situations, TMM can excessively buffer client data instead of closing the TCP window. This buffering occurs based on internal race conditions that are not directly controllable. This occurs only when the BIG-IP is providing SSL termination or origination. In extreme circumstances with a slow connection, this could ultimately lead to out of memory situations.

Impact

Increased memory usage, possibly leading to tmm crashing.

Conditions

The virtual must be providing SSL termination and/or origination.

Workaround

None

Fix Information

Flow control through SSL is consistent and no longer leaves the chain misordered on flow control.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips