Bug ID 494319: Proxy SSL caused tmm to core by dereferencing a null pointer

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2 HF1, 11.5.3 HF1, 11.5.3 HF2, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0, 11.6.0 HF5

Opened: Dec 03, 2014

Severity: 2-Critical

Related Article: K16811

Symptoms

When server side SSL decides to 'passthrough' the traffic, it requests that the client side convert itself to 'passthrough' mode, but the client side SSL was already in a closing state (due to timeout).

Impact

Traffic disrupted while tmm restarts.

Conditions

When both Proxy SSL and Proxy SSL Passthrough are enabled. Proxy SSL changes to passthrough mode, but the client side is closed or has timed out.

Workaround

None.

Fix Information

The system now checks that the state is not in closing state before updating the statistics.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips