Resolved issues
The resolved issues listed below may not list every bug that has been corrected with this release. For inquiries about a particular bug, please contact Technical Support within the FortiCare portal.
Bug ID |
Description |
---|---|
957770 |
BlackDuck Component Update - Berkeley DB 5.3.28. |
983847 |
Unable to trigger FortiToken auto push with IPSec ikev2 using FortiAuthenticator as RADIUS server with FortiClient/FortiGate client. |
1017747 |
FortiAuthenticator does not respond to SCEP request from Apple MDM. |
1025499 |
Silence excessive WAD logs. |
1041232 |
Third party component upgrade required for security reasons:CVE-2023-52434 on Linux Kernel. |
1045487 |
radiusd crashes when the user lockout time is |
1076780 |
Sporadic 500 error in SAML IdP login. |
1080629 |
|
1080681 |
SAML 500 error during logout - |
1081251 |
Improper session expiration after the administrator accounts are removed. |
1081415 |
Removal of |
1082809 |
|
1083193 |
|
1083211 |
|
1083212 |
Python |
1083213 |
|
1084688 |
WAD worker crashes after processing the FortiAuthenticator agent REST API request. |
1086837 |
If |
1091487 |
Fix two potential crashes (null dereferences) in the WAD http engine. |
1084561 |
Eliminate possibility of SQL injection in TACACS+ server. |
1084569 |
Eliminate possibility of SQL injection in TACACS+ server. |
1084570 |
Eliminate possibility of SQL injection in SCEP server. |
1084571 |
Eliminate possibility of SQL injection in LB HA daemon. |
1091783 |
Prevent potential path manipulation in Python. |
1098454 |
Eliminate possibility of shell injection through HSM operations. |
Common Vulnerabilities and Exposures
Bug ID |
CVE references |
---|---|
1041232 |
FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):
|
1054794 |
FortiAuthenticator 6.5.6 is no longer vulnerable to the following CVE-Reference(s):
|