Resolved issues
The following issues have been resolved in FortiADC 6.2.3 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.
|
Bug ID |
Description |
|---|---|
| 0788758 | SSL Forward Proxy memory leak. |
| 0783856 | CAPTCHA page does not allow Enter key to submit. |
| 0782707/0775097/0773368 |
Httproxy-ssl crash and memory leak issues on WAF enabled VS. |
| 0782260 | Management interface shows as down. |
| 0782132 | Website associated with a VS stops responding intermittently. |
| 0777422 | DNS resolving fails for SDN connectors. |
| 0777069 | TFTP Health Check script does not work. |
| 0776674 | SFP information does not display with diagnose hardware get
deviceinfo transceiver CLI command on some hardware models,
such as 2200F and 4200F. |
| 0775509 | Pop-up window displaying management IP showing in GUI, FortiView > OWASP Top 10 > A1:2017-Injection. |
| 0775262 | FortiADC Radius SLB with Dynamic Authorization is not functioning correctly and NAT is not applied. |
| 0774824 | Action mismatch between WAF alert and Logs. |
| 0774607 | CPU spikes occurring in both of the paired FortiADC units due to the DNSPod multi-thread daemon accessing null schedule data when the DNS request is very high. |
| 0774178 | Application profile does not accept domain names that include numbers. |
| 0770832 | Debug producing junk output. |
| 0770608 | Unable to register in FortiCare from AWS with FortiADC PAYG instance. |
| 0770359 | Slow failing back time. |
| 0770037 | URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack. |
| 0769573 | Telnet and SNMP are enabled by default on port1. |
|
0766519 |
NULL pointer dereference in GREP utility. |
| 0766502 | Ntpdate crash issue. |
| 0765668 | Kernel HA module crash. |
| 0748175 | Support recording TLS/SSL session keys for SMTP STARTTLS traffic. |
| 0741343 | Disable LLDP on Intel XL710 to solve the flapping issue. |
| 0670544 | L2 exception list member limit update to 1000. |
Common Vulnerabilities and Exposures
For more information, visit https://www.fortiguard.com/psirt.
|
|
|
|---|---|
| 0791753 | FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'). |
|
0790808 |
FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). |
|
0776310 |
FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-121: Stack-based Buffer Overflow. |
|
0771114 |
FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-124: Buffer Underwrite ('Buffer Underflow'). |
|
0771102 |
FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'). |
|
0765175 |
FortiADC 6.2.3 is no longer vulnerable to the following CVE-Reference: CWE-134: Use of Externally-Controlled Format String. |