Bug ID 676914: The SSL Session Cache can grow indefinitely if the traffic group is changed.

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1

Fixed In:
13.1.0, 12.1.3.6

Opened: Aug 03, 2017

Severity: 3-Major

Symptoms

If there are entries in the SSL Session Cache, and the traffic group is changed, the cache might grow indefinitely.

Impact

Eventually all memory will be consumed causing TMM to restart. Traffic disrupted while tmm restarts.

Conditions

-- SSL is configured. -- Session cache has a limit on the number of entries. -- After entries are made into the session cache, the traffic group is then changed.

Workaround

Disable the session cache. As an alternative, after changing the traffic group, restart TMM.

Fix Information

Changing the traffic group no longer causes the session cache to grow.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips