Resolved issues
The following issues have been resolved in FortiADC 7.0.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.
Bug ID |
Description |
---|---|
0790383 | GUI typo in Security Fabric > Automation: Configuraton → Configuration |
0789647 | L2 exception list is limited to 300 entries. |
0788758 | SSL Forward Proxy memory leak. |
0783856 | CAPTCHA page does not allow Enter key to submit. |
0782707/0781234/0775097 | Httproxy-ssl and httproxy crash related to WAF issues. |
0782260 | Management interface shows as down. |
0782132 | Website associated with a VS stops responding intermittently. |
0777422 | DNS resolving fails for SDN connectors. |
0777069 | TFTP Health Check script does not work. |
0776674 | SFP information does not display with diagnose hardware get deviceinfo transceiver CLI command on some hardware models, such as 2200F and 4200F. |
0775509 | Pop-up window displaying management IP showing in GUI, FortiView > OWASP Top 10 > A1:2017-Injection. |
0775262 | FortiADC Radius SLB with Dynamic Authorization is not functioning correct and NAT is not applied. |
0774824 | Action mismatch between WAF alert and Logs. |
0774818 | GUI typo: Patten → Pattern, Contrain → Constraint |
0774178 | Application profile does not accept domain names that include numbers. |
0773368 | High memory and crash due to restapi, httproxy-ssl and infod. |
0772149 | FortiADC firewall function failure when the address group name is too long. |
0770037 | URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack. |
0766519 |
NULL pointer dereference in GREP utility. |
0766502 | Ntpdate crash issue. |
0765668 | Kernel HA module crash. |
0762053 |
Should implement OFTP support for logging to FortiAnalyzer. |
0741343 |
Disable LLDP on Intel XL710 to solve the flapping issue. |
Common Vulnerabilities and Exposures
For more information, visit https://www.fortiguard.com/psirt.
Bug ID | Description |
---|---|
0765175 | FortiADC 7.0.1 is no longer vulnerable to the following CVE-Reference: CWE-134: Use of Externally-Controlled Format String. |