Bug ID 672008: NUL character inserted into syslog message when system time rolls over to exactly 1000000 microseconds

Last Modified: Oct 16, 2023

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1

Fixed In:
13.1.0, 12.1.3

Opened: Jun 30, 2017

Severity: 3-Major

Related Article: K22122208

Symptoms

Remote syslog logging destinations configured for RFC5424 format might receive malformed timestamp values if the log message is sent when clock rolls over to 1,000,000 microseconds exactly. The resulting log message will have a NUL character appended to the microseconds value in the log's timestamp field. Example: Correct timestamp: 2003-08-24T05:14:15.000000-07:00 Malformed timestamp: 2003-08-24T05:14:14.100000\00-07:00

Impact

Some syslog collectors may fail to parse the message, resulting in incorrect log entry or warning.

Conditions

-- syslog destination configured for RFC5424 format. -- Sending log message when clock rolls over to 1,000,000 microseconds.

Workaround

Change syslog destination format to use RFC3164, which does not include microsecond resolution in timestamp fields.

Fix Information

The timestamp field is now formatted correctly for microseconds and seconds values. Seconds now correctly increment when microseconds equal 1,000,000.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips