Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 6.2.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0749424 LACP issue causing shutdown in one port on switch and two LACP interfaces to go down in FortiADC.
0748636 Httproxy crashed when AV scanned a 5.1 GB size file.
0745311 Incorrect status output for unicast HA hb-type.
0744870 Incorrect NTP diag log.
0744482 AWS platform SSH is unavailable.
0743914 Httproxy crashed after changing the WAF profile then send traffic, waf_cookie_sec_scan.
0743690 VS stops forwarding traffic due to the fnginxctld and httproxy crashes.
0743119 System time not showing correctly.
0741029 Unable to establish Windows VPN L2TP through FortiADC.
0740912 Token parse error due to /tmp is full.
0740780 Data center unable to show if using country region.
0740226 High CPU and memory utilization caused by dnspod.
0736886 Hardware SSL crashes due to invalid job pointer causing get_done_requests() to crash.
0736799 No log name for the SNAT log.
0736392 Missing information in the logs for firewall status change.
0736358 Traffic logs not showing for L7 VS using TCP profile.
0736113 K8s connector will not accept IP addresses in the GUI or tokens via the CLI widget.
0735937 DNS response TTL is not correct if it has the same IP from different server.
0735075 Unable to see the certificate extensions on GUI for Local certificates.
0733833 Constant CPU utilization at 85%+ after importing user defined ISP address.
0731909 DNSD crashes when a new real server with FQDN type is added or modifying an existing one.
0731811 Automatic Backups does not work due to special characters in the password.
0724091 High memory consumption after upgrading to 6.1.2 due to the AV function.
0689373 GLB server gw is not correct in FortiView.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

0744291 FortiADC 6.2.1 is no longer vulnerable to the following CVE-Reference: CWE-788: Access of Memory Location After End of Buffer.

Resolved issues

The following issues have been resolved in FortiADC 6.2.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0749424 LACP issue causing shutdown in one port on switch and two LACP interfaces to go down in FortiADC.
0748636 Httproxy crashed when AV scanned a 5.1 GB size file.
0745311 Incorrect status output for unicast HA hb-type.
0744870 Incorrect NTP diag log.
0744482 AWS platform SSH is unavailable.
0743914 Httproxy crashed after changing the WAF profile then send traffic, waf_cookie_sec_scan.
0743690 VS stops forwarding traffic due to the fnginxctld and httproxy crashes.
0743119 System time not showing correctly.
0741029 Unable to establish Windows VPN L2TP through FortiADC.
0740912 Token parse error due to /tmp is full.
0740780 Data center unable to show if using country region.
0740226 High CPU and memory utilization caused by dnspod.
0736886 Hardware SSL crashes due to invalid job pointer causing get_done_requests() to crash.
0736799 No log name for the SNAT log.
0736392 Missing information in the logs for firewall status change.
0736358 Traffic logs not showing for L7 VS using TCP profile.
0736113 K8s connector will not accept IP addresses in the GUI or tokens via the CLI widget.
0735937 DNS response TTL is not correct if it has the same IP from different server.
0735075 Unable to see the certificate extensions on GUI for Local certificates.
0733833 Constant CPU utilization at 85%+ after importing user defined ISP address.
0731909 DNSD crashes when a new real server with FQDN type is added or modifying an existing one.
0731811 Automatic Backups does not work due to special characters in the password.
0724091 High memory consumption after upgrading to 6.1.2 due to the AV function.
0689373 GLB server gw is not correct in FortiView.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

0744291 FortiADC 6.2.1 is no longer vulnerable to the following CVE-Reference: CWE-788: Access of Memory Location After End of Buffer.