Bug ID 703515: MRF SIP LB - Message corruption when using custom persistence key

Last Modified: Oct 17, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7

Fixed In:
14.1.0, 14.0.0, 13.1.0.8, 12.1.3.6, 11.6.3.2

Opened: Jan 24, 2018

Severity: 2-Critical

Related Article: K44933323

Symptoms

If the custom persistence key is not a multiple of 3 bytes, the SIP request message may be corrupted when the via header is inserted.

Impact

The SIP request message may be corrupted when the via header is inserted.

Conditions

Custom persistence key is not a multiple of 3 bytes

Workaround

Pad the custom persistence key to a multiple of 3 bytes in length.

Fix Information

All persistence key lengths work as expected.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips