Bug ID 1015117: Headers are corrupted during modification/insertion if a mix of end-of-line markers <CRLF> and <LF> are used

Last Modified: Feb 07, 2024

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
17.0.0, 16.1.1, 16.1.0,, 16.0.1,, 16.0.0, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3,,,,,,, 14.1.4, 13.1.4,,,

Opened: Apr 28, 2021

Severity: 4-Minor


HTTP header corruption occurs after insertion/modification using an iRule in HTTP Headers which contain mixed end-of-line markers <CRLF> and <LF>.


Inserted headers get concatenated in such a way that the HTTP request header gets corrupted.


- HTTP virtual server - An iRule, policy or profile inserts an HTTP Request header - Such as x-forwarded-for - An HTTP request contains some lines that end with <CRLF> and some that end with <LF>


Use HTTP headers with proper end-of-line markers in compliance with HTTP RFC

Fix Information


Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips