Bug ID 692557: When BIG-IP as SAML IdP processes signed authentication requests from external SAML SP, a block of memory may become corrupted.

Last Modified: Nov 07, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP APM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4,, 12.1.5,,,, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.1.0,,,

Fixed In:
14.0.0,, 13.0.1

Opened: Nov 03, 2017
Severity: 2-Critical


After processing signed authentication requests from external SAML SP, SAML IdP may corrupt a block of tmm memory.


Various possible negative effects, including TMM core. Traffic disrupted while tmm restarts.


- BIG-IP system is configured as SAML IdP. - IdP is configured with external SP's signing certificate. - External SP sends signed authentication request.



Fix Information

BIG-IP as SAML IdP no longer causes memory corruption when handling certain traffic.

Behavior Change