Bug ID 498005: The HTTP:payload command could cause the TMM to crash if invoked in a non-HTTP event

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM, LTM(all modules)

Known Affected Versions:
11.6.2 HF1, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.0.0, 11.5.2 HF1

Opened: Dec 22, 2014

Severity: 2-Critical

Symptoms

The HTTP::payload command could cause the TMM to crash if invoked when HTTP had already started egressing data to other filters. This could only happen if HTTP::payload was used in a non-HTTP event.

Impact

Traffic disrupted while tmm restarts.

Conditions

HTTP::payload is used in a non-HTTP iRule.

Workaround

Use i.e. ASM::payload if you want the payload within an ASM event.

Fix Information

HTTP::payload will no longer cause a TMM crash if invoked in a non-HTTP event. Instead, an error will be returned to the iRule.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips