Bug ID 665905: Signature System corruption from specific ASU prevents ASU load after upgrade

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
12.1.2, 12.1.1, 12.1.0, 12.0.0, 11.6.1, 11.6.0

Fixed In:
12.1.3, 11.6.2

Opened: May 22, 2017

Severity: 3-Major

Related Article: K83305000

Symptoms

After loading Attack Signature Update "ASM-SignatureFile_20170403_145743.im" on 11.5.4 HF2 (or later) and upgrading to certain software versions, attempts to perform Signature Update fail.

Impact

Attempts to perform Signature Update fail.

Conditions

-- Loading Attack Signature Update "ASM-SignatureFile_20170403_145743.im". -- Using v11.5.4 HF2 (or later). -- Upgrading the device to 11.6.1, 12.1.0, 12.1.1, or 12.1.2.

Workaround

The mistaken Signature System can be deleted using the following SQL: ---------------------------------------------------------------------- UPDATE PLC.NEGSIG_SIGNATURE_SYSTEMS set system_id = 14 where system_id = (select system_id FROM PLC.NEGSIG_SYSTEMS where system_name = 'Apache'); DELETE FROM PLC.NEGSIG_SYSTEMS where system_name = 'Apache'; ----------------------------------------------------------------------

Fix Information

Database corruption introduced by loading Attack Signature Update 'ASM-SignatureFile_20170403_145743.im' is now corrected upon upgrade.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips