Resolved issues
The following issues have been resolved in FortiADC 6.2.6 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.
Bug ID |
Description |
---|---|
0881065 | Request to increase the Maximum Packet Count in Packet Capture from the current 10,000 to 100,000. |
0873773 | Memory leak issue caused by configuration synchronization after upgrading to FortiADC 6.2.5. |
0867226 | The Cookie Security policy Max Age unit is based in minutes in the GUI, but the value that is inserted to the cookie is based on seconds, which means the given range would be incorrect. |
0865442 |
DNS SLB does not forward server response when RS returns failures. |
0857019 | FortiADC console displays kernel related messages when execute
reload command is executed. |
0855871 | Upgrade failed due to unsupported "firewall nat-snat" IPv6 configuration. |
0848745 | Health check does not fail even when the real server is not configured with the services due to some daemon being unable to register the cmdb event. |
0847611 | System random reboot issue caused by IRQ handling. |
0828572 | 200D/100F/200F/1000F/2000F/4000F wrongly use FortiADC-VM as the default certificate, which may cause FortiSandbox Cloud connection issue. |
Common Vulnerabilities and Exposures
For more information, visit https://www.fortiguard.com/psirt.
Bug ID |
Description |
---|---|
0852344 | FortiADC 6.2.6 is no longer vulnerable to the following CVE-Reference: CWE-78: Improper Neutralization of Special Elements used in an OS Command ("OS Command Injection"). |