Resolved issues
The following issues have been resolved in FortiADC 6.0.4 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.
| Bug ID | Description |
|---|---|
| 0754366 | Abnormal memory usage after upgrade from FortiADC 5.4.4 to 6.0.3. |
| 0752796 | A-A VRRP session sync does not work. |
| 0750824 | Unexpected reboots of FortiADC device on HA cluster. |
| 0747746 | Unable to access GUI and SSH after upgrade from FortiADC 5.3.4 to 6.0.3. |
| 0747637 | FortiADC devices fail one after another in HA. |
| 0741029 | Unable to establish Windows VPN L2TP through FortiADC. |
| 0740912 | Token parse error due to /tmp is full. |
| 0740847 | Unable to change password through GUI. |
| 0740226 | High CPU and memory utilization caused by dnspod. |
| 0736799 | No log name for the SNAT log. |
| 0733833 | Constant CPU utilization at 85%+ after importing user defined ISP address. |
| 0731811 | Automatic Backups does not work due to special characters in the password. |
| 0728103 | Content route matching IP 0.0.0.0 takes precedence which overwrites other content route matching on different IP. |
| 0728077 | SNMP retrieves the wrong status for Real Server. |
| 0726621 | Real server status showing as "unknown" in GUI. |
| 0725917 | FortiGuard Tunneling Username required. |
| 0720273 | Interface VLAN returns MAC address as 00:00:00:00:00:00. |
| 0715650 | Error on setting secondary IP on loopback interface on Second A-A-VRRP HA node . |
| 0701323 | GUI slowness with 255 real servers. |
| 0698484 |
FortiADC High Availability out of sync. The refcnt cannot be released in netdev_wait_allrefs() because of CLI set dedicate-to-mgmt enable. This leads to dead loop when exec reload. |
| 0687353 | Kernel crash due to fib_stat is used after being freed. |
| 0644119 | CPU gets stuck due to the fib_cache issue. |
Common Vulnerabilities and Exposures
For more information, visit https://www.fortiguard.com/psirt.
|
Bug ID |
Description |
|---|---|
| 0708219 | FortiADC 6.0.4 is no longer vulnerable to the following CVE-Reference: CWE-770: Allocation of Resources Without Limits or Throttling |