Bug ID 815753: TMM leaks memory when explicit SWG is configured with Kerberos authentication

Last Modified: Oct 16, 2023

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
13.1.3, 13.1.3.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 14.1.4, 14.1.4.1, 14.1.4.2, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6, 15.0.0, 15.0.1

Fixed In:
15.1.0, 15.0.1.1, 14.0.1.1, 13.1.3.2

Opened: Aug 17, 2019

Severity: 3-Major

Symptoms

Memory usage of filter keeps increasing over time and becomes one of major consumers of the TMM memory.

Impact

TMM sweeper enters aggressive mode and reaps connections.

Conditions

This issue happens if the following conditions are met: 1. Access profile type is SWG-explicit. 2. Access policy contains HTTP 407 Response policy item with HTTP Auth Level being Negotiate. 3. Kerberos is used to authenticate a user.

Workaround

None.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips