Bug ID 879401: Memory corruption during APM SAML SSO

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4, 15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1

Fixed In:
16.0.0, 15.1.3, 14.1.2.5

Opened: Feb 10, 2020

Severity: 2-Critical

Related Article: K90423190

Symptoms

During processing of SAML SSO single logout (SLO) requests, a block of tmm memory may become corrupted. You might experience several types of unexpected actions, including a TMM restart and core-file generation.

Impact

Various possible negative effects, including TMM core. Traffic disrupted while tmm restarts.

Conditions

-- BIG-IP system is configured as SAML SP. -- External SAML IdP sends SLO request.

Workaround

None.

Fix Information

BIG-IP systems configured as SAML SP no longer cause memory corruption when handling certain traffic.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips