Resolved Issues
The following issues have been fixed in version 6.0.12. For inquires about a particular bug, please contact Customer Service & Support.
Antivirus
Bug ID |
Description |
---|---|
582368 |
URL threat detection version shows a large negative number after FortiGate reboots. |
Firewall
Bug ID |
Description |
---|---|
520558 |
Should not do passive port NAT for FTP session helper. |
643446 |
Fragmented UDP traffic is silently dropped when fragments have different ECN values. |
683604 |
When changing a policy and creating a firewall sniffer concurrently, there is traffic that is unrelated to the policy that is being changed and matching the implicit deny policy. Some IPv4 firewall policies were missing after the change. |
FortiView
Bug ID |
Description |
---|---|
650447 |
Negative value displayed in the Bytes column on the FortiView > VPN page. |
GUI
Bug ID |
Description |
---|---|
467495 |
A message stating that all source interfaces have no members is erroneously displayed for the explicit proxy policy list when a user enables a policy immediately after pasting or inserting it into the list. |
587673 |
The Interface Pair View option is always unavailable for the Proxy Policy list. |
662434 |
Aggregated interfaces that are also in a zone are not displayed correctly in the GUI. They are displayed correctly in the Zone section of Network > Interfaces, but not in the Aggregate section. |
HA
Bug ID |
Description |
---|---|
507013, 525522 |
HA configuration checksum mismatch between debug zone and checksum. |
530215 |
Application hasync may crash several times due to accessing memory out of bound when processing hastat data. |
540600 |
The HA |
584551 |
|
601550 |
Application hasync may crash several times due to accessing memory out of bound when processing hastat data. |
621583 |
HA status is not displayed in the GUI when HB cables reconnect. |
637711 |
CSR on cluster primary is generating out-of-sync alerts on secondary and tertiary devices. |
643958 |
Inconsistent data from FFDB caused several confsyncd crashes. |
651674 |
Long sessions lost on new primary after HA failover. |
654341 |
The new join-in secondary chassis failed to sync, while primary chassis has 6K policies in one VDOM. |
Intrusion Prevention
Bug ID |
Description |
---|---|
668631 |
IPS is constantly crashing, and ipshelper has high CPU when IPS extended database has too many rules (more than 256) sharing the same pattern. Affected models: SoC3-based FortiGates. |
691395 |
Signature false positives causing outage after IPS database update. |
IPsec VPN
Bug ID |
Description |
---|---|
610203 |
When an offloaded IPsec SA uses NP6 reserved space, it gets stuck and packets on the tunnel start to drop. |
Log & Report
Bug ID |
Description |
---|---|
513959 |
Memory usage in event log does not match the number in |
551031 |
FortiGate lost logs to FortiAnalyzer when route was changed and without physical interface being down. |
555161 |
Application miglogd crashes when numerous DLP logs are generated, where DLP archive files use up system inodes. |
634947 |
rlogd signal 11 crashes. |
643099 |
|
Proxy
Bug ID |
Description |
---|---|
501299 |
WAD sometimes does not spawn any workers when configuring FG-101E after a factory reset. |
578850 |
Application WAD crash several times due to signal alarm. |
603195 |
Multiple WAD crashes with signal 11. |
615391 |
Reusing the buffer region caused frequent WAD crashes. |
617099 |
WAD crashes every few minutes. |
620453 |
Application WAD crash several times due to signal alarm. |
621787 |
On some smaller models, WAD watchdog times out when there is a lot of SSL traffic. |
653099 |
Wildcard URL filter in proxy mode with |
Routing
Bug ID |
Description |
---|---|
576930 |
Time stamps are missing in routing debugs. |
593887 |
High CPU usage from link monitor daemon. |
641022 |
Kernel does not remove duplicate routes generated by SD-WAN health checks when hostname IP changes. |
Security Fabric
Bug ID |
Description |
---|---|
609182 |
Security Fabric Settings page sometimes cannot load FortiSandbox URL threat detection version despite FortiSandbox being connected. |
SSL VPN
Bug ID |
Description |
---|---|
548599 |
SSL VPN crashes on parsing some special URLs. |
551695 |
Office365 applications through SSL VPN bookmarks. |
573727 |
Cannot establish an SSL VPN connection using FortiClient for Mac OS when |
573853 |
TX packet drops on SSL root interface. |
580377 |
Unable to access https://outlook.office365.com as bookmark in SSL VPN web mode. |
591613 |
https://outlook.office365.com cannot be accessed in SSLVPN web portal. |
596273 |
sslvpnd worker process crashes, causing a zombie tunnel session. |
608453 |
Internal website is not accessible from SSL VPN due to some Sage X3 JS files with errors. |
610995 |
Error in SSL VPN web mode when accessing internal website, https://st***.st*.ca/. |
617170 |
https://outlook.office365.com cannot be accessed in SSLVPN web portal. |
622068 |
Adding FQDN routing address in split tunnel configuration injects single route in client for multiple A records. |
633114 |
Cannot access internal website pl***.fr using SSL VPN web mode. |
633684 |
Host check causing Mac users to be unable to connect to SSL VPN. |
644506 |
Cannot authenticate to SSL VPN using 2FA if remote LDAP user and user within RADIUS group has same user name and password. |
646429 |
Update Telnet idle timeout setting. |
648192 |
Improve DTLS tunnel performance by allowing multiple packets to be read from the kernel driver, and redistribute the UDP packets to several worker processes in the kernel. |
648433 |
Internal website loading issue in SSL VPN web portal for ca***.fr. |
656557 |
The map on the http://www.op***.org website could not be shown in SSL VPN web mode. |
662042 |
The https://outlook.office365.com and https://login.microsoft.com websites cannot be accessed in the SSL VPN web portal. |
664121 |
SCM VPN disconnects when performing an SVN checkout. |
665879 |
When sslvpn processes the HTTP/HTTPS response with content disposition, it will change the response body since the content type is HTML. |
670803 |
Internal website, http://gd***.local/share/page?pt=login, log in page does not load in SSL VPN web mode. |
System
Bug ID |
Description |
---|---|
508085 |
The address object is still created even if the user sets an invalid address. |
540354 |
WAD high CPU usage on FortiGate models not supporting SSH proxy in FOS 5.6. After upgrade to FOS 6.0, the SSL SSH profile |
571720 |
Using DHCP to acquire addresses for |
585841 |
Console prints out |
587521 |
In VIP server load-balancing, |
598464 |
Rebooting FG-1500D in 5.6.x during upgrade causes an L2 loop on the heartbeat interface and VLAN is disabled on the switch side. |
605723 |
FG-600E stops sending out packets on its SPF and copper port on NP6. |
623775 |
newcli daemon crash due to FTM user token activation email processing. |
627629 |
DHCP client sent invalid DHCPREQUEST format during INIT state. |
628642 |
Issue when packets from the same session are forwarded to each LACP member when NPx offloading is enabled. |
631296 |
Forward or local bi-directional traffic from NPU inter-VDOM links through separate VDOMs is subject to high latency. |
633827 |
Errors during fuzzy tests on FG-1500D. |
634929 |
NP6 SSE drops after a couple of hours in a stability test. |
642005 |
FortiGate does not send |
649729 |
HA sync packets are hashed to a single queue while |
660709 |
The sflowd process has high CPU usage when application control is enabled. |
666030 |
Empty firewall objects after pushing several policy deletes. |
User & Device
Bug ID |
Description |
---|---|
604844 |
The user group |
637577 |
Inconsistent fnbamd LDAP group match result. |
675539 |
FSSO collector status is down, despite that it is reported as connected by authd in a multi-VDOM environment. |
VM
Bug ID |
Description |
---|---|
656701 |
FG-VMX service manager enters conserve mode; cmdbsvr has high memory utilization. |
Web Filter
Bug ID |
Description |
---|---|
553593 |
|
WiFi Controller
Bug ID |
Description |
---|---|
608717 |
Packet loss over CAPWAP tunneled SSID. |
618456 |
High cw_acd usage upon polling a large number of wireless clients with REST API. |
680503 |
The current Fortinet_Wifi certificate will expire on 2021-02-11. |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE references |
---|---|
606237 |
FortiOS 6.0.12 is no longer vulnerable to the following CVE Reference:
|