Bug ID 815753: TMM leaks memory when explicit SWG is configured with Kerberos authentication

Last Modified: Jun 10, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP APM(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 15.0.0, 15.0.1

Fixed In:
15.1.0, 15.0.1.1, 14.0.1.1, 13.1.3.2

Opened: Aug 17, 2019
Severity: 3-Major

Symptoms

Memory usage of filter keeps increasing over time and becomes one of major consumers of the TMM memory.

Impact

TMM sweeper enters aggressive mode and reaps connections.

Conditions

This issue happens if the following conditions are met: 1. Access profile type is SWG-explicit. 2. Access policy contains HTTP 407 Response policy item with HTTP Auth Level being Negotiate. 3. Kerberos is used to authenticate a user.

Workaround

None.

Fix Information

None

Behavior Change