PAN-OS 10.2.18-h5 Addressed Issues
Focus
Focus

PAN-OS 10.2.18-h5 Addressed Issues

Table of Contents

PAN-OS 10.2.18-h5 Addressed Issues

PAN-OSĀ® 10.2.18-h5 addressed issues.
Issue ID
Description
PAN-316911
(VM-Series firewalls on Amazon Web Services (AWS) environments only) Fixed an issue where a newly bootstrapped firewall required a management server restart, relicensing, or license push from Panorama to invoke the device certificate.
PAN-312706
Fixed an issue where the firewalls restarted due to a function lacking a NULL-pointer sanity check.
PAN-308507
(Panorama managed firewalls only) Fixed an issue where the firewall intermittently failed to maintain active log forwarding streams to Strata Logging Service (SLS) even when duplicate logging and enhanced application logging were enabled.
PAN-307795
Fixed an issue where Panorama incorrectly generated system logs indicating a lost connection to its peer after an upgrade even when High Availability was not configured.
PAN-307597
Fixed an issue where BGP peering sessions between a hub firewall and a satellite firewall over GlobalProtect LSVPN failed to connect.
PAN-305415
Fixed an issue where commits caused high dataplane CPU utilization and briefly increased Packet Descriptors, which disrupted traffic.
PAN-304756
Fixed an issue on Panorama where, after you disabled the shared optimization feature, a full configuration push to multi-vsys devices caused a validation error.
PAN-303051
Fixed an issue on Panorama where a memory leak occurred related to the reportd process due to retaining memory that was temporarily used for report generation instead of releasing the memory for reuse, which resulted in continuous accumulation and memory exhaustion.
PAN-301409
Fixed an issue where Panorama failed to perform a selective push to a managed device when device tags were added or modified on the policy rules. The selective push would fail with the error message Failed to generate selective push configuration. Schema validation failed. Please try a full push.
PAN-300671
Fixed an issue where traffic reports that were generated with destination/source and destination/source hostnames were not displayed in IPv4 format.
PAN-297610
Fixed an issue where the firewall became unresponsive after an upgrade due to the fsck command scanning drive partitions in parallel with the root partition, which caused the process to take an extended amount of time.
PAN-295470
Fixed an issue on the firewall where the useridd process continuously increased its memory consumption, which resulted in an OOM condition that caused the firewall to restart.
PAN-291067
Fixed an issue where the devsrvr process periodically exceeded its virtual memory limit and restarted, which led to intermittent outages.
PAN-291009
Fixed an issue where, after a web server returned a 401 or 403 error, the firewall was unable to decrypt HTTP/2 traffic, and the firewall rejected all subsequent streams from the client.
PAN-289249
Fixed an issue where a memory leak occurred on the reportd process when a WildFire update was initiated while device telemetry data collection was in progress. This resulted in an OOM condition.
PAN-284067
Fixed a cumulative memory leak in the devsrvr process that occurred whenever the CLI command show running application statistics was issued. This memory leak would gradually consume system memory and produce an OOM condition, causing the firewall to reboot.
PAN-280196
Fixed an issue in Prisma Access environments where the firewall matched a HIP object but not on the HIP profile that contained the object.
PAN-279364
(VM-Series firewalls with multiple NICs only) Fixed an issue were the queue count in the task dump displayed an incorrect number of queues for SR-IOV interfaces due to the queue mapping logic incorrectly using a non-multi-NIC function.
PAN-274742
(VM-Series firewalls only) Fixed an issue where the task-queue dump CLI command returned incorrect information in multi-nic mode.
PAN-261825
Fixed an issue where traffic was dropped when Data Loss Prevention or Advanced URL Filtering were enabled. This occurred when the payload size was greater than 3.5 KB.
PAN-252809
Fixed an issue where a single PIM neighbor was sending 0.0.0.0 as its address, which occurred because an improvement in PIM neighbor address selection did not correctly account for configurations with a single IP address.
PAN-242952
Fixed an issue where high SSL traffic depleted flex memory, which prevented the firewall from revalidating SSLVPN client CAs during configuration pushes.
PAN-230748
Fixed an issue where the firewall displayed the current time as the expiration date for an imported certificate in the CLI output instead of the correct expiry time due to an improper use of an OpenSSL library function.
PAN-202911
Fixed an issue where a satellite tunnel was not established after turning on satellite firewalls.