Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Resolved issues

The following issues have been resolved in FortiADC 6.0.4 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID Description
0754366 Abnormal memory usage after upgrade from FortiADC 5.4.4 to 6.0.3.
0752796 A-A VRRP session sync does not work.
0750824 Unexpected reboots of FortiADC device on HA cluster.
0747746 Unable to access GUI and SSH after upgrade from FortiADC 5.3.4 to 6.0.3.
0747637 FortiADC devices fail one after another in HA.
0741029 Unable to establish Windows VPN L2TP through FortiADC.
0740912 Token parse error due to /tmp is full.
0740847 Unable to change password through GUI.
0740226 High CPU and memory utilization caused by dnspod.
0736799 No log name for the SNAT log.
0733833 Constant CPU utilization at 85%+ after importing user defined ISP address.
0731811 Automatic Backups does not work due to special characters in the password.
0728103 Content route matching IP 0.0.0.0 takes precedence which overwrites other content route matching on different IP.
0728077 SNMP retrieves the wrong status for Real Server.
0726621 Real server status showing as "unknown" in GUI.
0725917 FortiGuard Tunneling Username required.
0720273 Interface VLAN returns MAC address as 00:00:00:00:00:00.
0715650 Error on setting secondary IP on loopback interface on Second A-A-VRRP HA node .
0701323 GUI slowness with 255 real servers.
0698484 FortiADC High Availability out of sync. The refcnt cannot be released in netdev_wait_allrefs() because of CLI set dedicate-to-mgmt enable. This leads to dead loop when exec reload.
0687353 Kernel crash due to fib_stat is used after being freed.
0644119 CPU gets stuck due to the fib_cache issue.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0708219 FortiADC 6.0.4 is no longer vulnerable to the following CVE-Reference: CWE-770: Allocation of Resources Without Limits or Throttling

Resolved issues

The following issues have been resolved in FortiADC 6.0.4 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID Description
0754366 Abnormal memory usage after upgrade from FortiADC 5.4.4 to 6.0.3.
0752796 A-A VRRP session sync does not work.
0750824 Unexpected reboots of FortiADC device on HA cluster.
0747746 Unable to access GUI and SSH after upgrade from FortiADC 5.3.4 to 6.0.3.
0747637 FortiADC devices fail one after another in HA.
0741029 Unable to establish Windows VPN L2TP through FortiADC.
0740912 Token parse error due to /tmp is full.
0740847 Unable to change password through GUI.
0740226 High CPU and memory utilization caused by dnspod.
0736799 No log name for the SNAT log.
0733833 Constant CPU utilization at 85%+ after importing user defined ISP address.
0731811 Automatic Backups does not work due to special characters in the password.
0728103 Content route matching IP 0.0.0.0 takes precedence which overwrites other content route matching on different IP.
0728077 SNMP retrieves the wrong status for Real Server.
0726621 Real server status showing as "unknown" in GUI.
0725917 FortiGuard Tunneling Username required.
0720273 Interface VLAN returns MAC address as 00:00:00:00:00:00.
0715650 Error on setting secondary IP on loopback interface on Second A-A-VRRP HA node .
0701323 GUI slowness with 255 real servers.
0698484 FortiADC High Availability out of sync. The refcnt cannot be released in netdev_wait_allrefs() because of CLI set dedicate-to-mgmt enable. This leads to dead loop when exec reload.
0687353 Kernel crash due to fib_stat is used after being freed.
0644119 CPU gets stuck due to the fib_cache issue.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0708219 FortiADC 6.0.4 is no longer vulnerable to the following CVE-Reference: CWE-770: Allocation of Resources Without Limits or Throttling