Bug ID 746710: Use of HTTP::cookie after HTTP:disable causes TMM core

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2

Fixed In:
15.0.0, 14.1.2.1, 13.1.3

Opened: Oct 12, 2018

Severity: 2-Critical

Symptoms

When an iRule disables HTTP with HTTP:disable, subsequent use of HTTP::cookie for that request will cause a TMM core dump.

Impact

Use of iRules in the above mentioned order will result in a TMM core. Traffic disrupted while tmm restarts.

Conditions

1) HTTP profile is configured on the virtual. 2) HTTP:disable is called on request. 3) HTTP:cookie is then called on that request.

Workaround

Do not call HTTP:cookie on requests that have had HTTP disabled by HTTP:disable

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips