Bug ID 542724: If there is OCSP Stapling enabled on a clientSSL profile, under certain remote conditions, TMM could crash

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
11.6.0, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.1.0, 11.6.1

Opened: Aug 31, 2015

Severity: 3-Major

Related Article: K29441414

Symptoms

If there is OCSP Stapling enabled on a clientSSL profile, under certain remote conditions, TMM could crash.

Impact

Traffic disrupted while tmm restarts.

Conditions

This occurs when the following conditions are met: - There is an OCSP request in progress. - There is a configuration change. - The handshake is aborted. - The HTTP response for the OCSP request indicates a status code that is not 200.

Workaround

None.

Fix Information

TMM no longer crashes if there is OCSP Stapling enabled on a clientSSL profile, under certain remote conditions.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips