Resolved issues
The following issues have been fixed in FortiProxy 7.0.19. For inquiries about a particular bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
859937, 975685 |
Possible wad memory leak. |
996624 |
Explicit FTP fails to set up data channel in active mode on transparent mode. |
1002558 |
Fix Invalid fields on policy page. |
1003729 |
Unable to configure ha-mgmt-intf ip for FortiProxy in transparent mode. |
1003898 |
ICAP client issue on receiving 204 response. |
1015722, 1054835, 1064758 |
When |
1020657 |
Failure to establish an FTPS data channel in TP mode . |
1026020 |
_wad_tcp_port_rebuild may leak wad_session_context object. |
1035614 |
Unpacked variables do not match the pack layout. |
1036823, 1083982 |
Fix some GUI issues. |
1039006 |
Increase the maximum http2 header value length from 16 KB to 32KB to accommodate websites with a bigger header value. |
1045084 |
Potential overrun in bmclib.c. |
1047542 |
WAD fails to forward HTTP request with header 'accept-encoding: zstd' when strip-encoding is enabled. |
1047758 |
Website encounters slowness and stuck issue due to http2. |
1049243 |
Access issue after changing captive portal type. |
1049784 |
Cannot deploy FortiProxy on ESXi 8.0 using the OVF file. |
1050315 |
Cannot change proxy-address type in CLI when the type is referenced. |
1058198, 1060782 |
Traffic loop caused by HA in TP mode. |
1059374 |
Traffic cannot be forward to isolator after changing the name of the isolator in FortiProxy. |
1059663 |
Access issue with dedicated-to management interface in HA mode in transparent mode. |
1060351 |
Cannot visit Gmail and other websites after enabling Strict-Web-Check. |
1060903, 1060905, 1084028 |
CSF path traversal vulnerabilities |
1066013 |
Aggregate interface and all related interfaces flap when any of the aggregate interface configuration is changed. |
1066209 |
SNMP MIB file check failure for FPX-4000G. |
1070236 |
WAN Opt ports 7810 and 7802 are always exposed even when no wanopt profile is enabled. |
1076622 |
WAD and DLP block large .exe files, but do not issue an HTTP 403. |
1078472 |
HA works only under NAT mode, not under transparent mode. |
1081878 |
WAD crash in wad_ssl_unsupport_block_check. |
Common vulnerabilities and exposures
FortiProxy 7.0.19 is no longer vulnerable to the following CVE reference. Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE reference |
---|---|
985048 |
|
868634 |