Bug ID 539385: When logging if the length of argument value is very long, log buffer overflows.

Last Modified: Jul 17, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP All(all modules)

Known Affected Versions:
12.0.0, 12.0.0 HF1, 12.0.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4,, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,,,,, 14.0.0,,,,,, 14.1.0,,,,,,, 15.0.0

Opened: Aug 12, 2015
Severity: 3-Major


If Access Policy event logs include long string arguments (greater than 8 KB), the log buffer grows while processing each log parameter. The log information can overflow to other files such as, user.log and message.log.


Log information gets truncated and some amount spills over to user.log and message.log.


Larger value for log parameters (mainly of string type). Happens only when the parameters are very long (greater than 8 KB), for example, assigning big string into session variables.



Fix Information


Behavior Change