Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The resolved issues listed below may not list every bug that has been corrected with this release. For inquiries about a particular bug, please contact Technical Support within the FortiCare portal.

Bug ID

Description

957770

BlackDuck Component Update - Berkeley DB 5.3.28.

983847

Unable to trigger FortiToken auto push with IPSec ikev2 using FortiAuthenticator as RADIUS server with FortiClient/FortiGate client.

1017747

FortiAuthenticator does not respond to SCEP request from Apple MDM.

1025499

Silence excessive WAD logs.

1041232

Third party component upgrade required for security reasons:CVE-2023-52434 on Linux Kernel.

1045487

radiusd crashes when the user lockout time is NULL.

1076780

Sporadic 500 error in SAML IdP login.

1080629

curl upgrade in 6.5.

1080681

SAML 500 error during logout - Invalid Session Index.

1081251

Improper session expiration after the administrator accounts are removed.

1081415

Removal of libgd component.

1082809

ftmd crash if the FTM server returns a NULL state when polling a pending token.

1083193

libxml2 upgrade in 6.5.

1083211

Django upgrade in 6.5.

1083212

Python jinja2 upgrade in 6.5.

1083213

OpenVPN upgrade in 6.5.

1084688

WAD worker crashes after processing the FortiAuthenticator agent REST API request.

1086837

If mailNickName is used as the LDAP username attribute, the remote LDAP user authentication is broken.

1091487

Fix two potential crashes (null dereferences) in the WAD http engine.

1084561

Eliminate possibility of SQL injection in TACACS+ server.

1084569

Eliminate possibility of SQL injection in TACACS+ server.

1084570

Eliminate possibility of SQL injection in SCEP server.

1084571

Eliminate possibility of SQL injection in LB HA daemon.

1091783

Prevent potential path manipulation in Python.

1098454

Eliminate possibility of shell injection through HSM operations.

Common Vulnerabilities and Exposures

Bug ID

CVE references

1041232

FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):

  • CVE-2023-52434

1054794

FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):

  • CVE-2024-3596

Resolved issues

Resolved issues

The resolved issues listed below may not list every bug that has been corrected with this release. For inquiries about a particular bug, please contact Technical Support within the FortiCare portal.

Bug ID

Description

957770

BlackDuck Component Update - Berkeley DB 5.3.28.

983847

Unable to trigger FortiToken auto push with IPSec ikev2 using FortiAuthenticator as RADIUS server with FortiClient/FortiGate client.

1017747

FortiAuthenticator does not respond to SCEP request from Apple MDM.

1025499

Silence excessive WAD logs.

1041232

Third party component upgrade required for security reasons:CVE-2023-52434 on Linux Kernel.

1045487

radiusd crashes when the user lockout time is NULL.

1076780

Sporadic 500 error in SAML IdP login.

1080629

curl upgrade in 6.5.

1080681

SAML 500 error during logout - Invalid Session Index.

1081251

Improper session expiration after the administrator accounts are removed.

1081415

Removal of libgd component.

1082809

ftmd crash if the FTM server returns a NULL state when polling a pending token.

1083193

libxml2 upgrade in 6.5.

1083211

Django upgrade in 6.5.

1083212

Python jinja2 upgrade in 6.5.

1083213

OpenVPN upgrade in 6.5.

1084688

WAD worker crashes after processing the FortiAuthenticator agent REST API request.

1086837

If mailNickName is used as the LDAP username attribute, the remote LDAP user authentication is broken.

1091487

Fix two potential crashes (null dereferences) in the WAD http engine.

1084561

Eliminate possibility of SQL injection in TACACS+ server.

1084569

Eliminate possibility of SQL injection in TACACS+ server.

1084570

Eliminate possibility of SQL injection in SCEP server.

1084571

Eliminate possibility of SQL injection in LB HA daemon.

1091783

Prevent potential path manipulation in Python.

1098454

Eliminate possibility of shell injection through HSM operations.

Common Vulnerabilities and Exposures

Bug ID

CVE references

1041232

FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):

  • CVE-2023-52434

1054794

FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):

  • CVE-2024-3596