Bug ID 752078: Header Field Value String Corruption

Last Modified: Nov 07, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4,, 12.1.5,,,, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,, 14.0.0,,,,,, 14.0.1,, 14.1.0,,,,

Fixed In:

Opened: Dec 05, 2018
Severity: 3-Major


This is specific to HTTP/2. In some rare cases, the header field value string can have one or more of its prefix characters removed by the BIG-IP system.


A header such as: x-info: very_long_string that has whitespace characters may be sent to the client as: x-info: ery_long_string that has whitespace characters


-- The header field value string is exceptionally long, and has embedded whitespace characters. -- HTTP/2 is used.



Fix Information

The BIG-IP system no longer removes the prefix characters from very long HTTP/2 header field value strings containing embedded whitespace characters.

Behavior Change