Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.0.19. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

859937, 975685

Possible wad memory leak.

996624

Explicit FTP fails to set up data channel in active mode on transparent mode.

1002558

Fix Invalid fields on policy page.

1003729

Unable to configure ha-mgmt-intf ip for FortiProxy in transparent mode.

1003898

ICAP client issue on receiving 204 response.

1015722, 1054835, 1064758

When tcp-window-type is set to auto-tuning, throughput for single file download speed falls below expectation.

1020657

Failure to establish an FTPS data channel in TP mode .

1026020

_wad_tcp_port_rebuild may leak wad_session_context object.

1035614

Unpacked variables do not match the pack layout.

1036823, 1083982

Fix some GUI issues.

1039006

Increase the maximum http2 header value length from 16 KB to 32KB to accommodate websites with a bigger header value.

1045084

Potential overrun in bmclib.c.

1047542

WAD fails to forward HTTP request with header 'accept-encoding: zstd' when strip-encoding is enabled.

1047758

Website encounters slowness and stuck issue due to http2.

1049243

Access issue after changing captive portal type.

1049784

Cannot deploy FortiProxy on ESXi 8.0 using the OVF file.

1050315

Cannot change proxy-address type in CLI when the type is referenced.

1058198, 1060782

Traffic loop caused by HA in TP mode.

1059374

Traffic cannot be forward to isolator after changing the name of the isolator in FortiProxy.

1059663

Access issue with dedicated-to management interface in HA mode in transparent mode.

1060351

Cannot visit Gmail and other websites after enabling Strict-Web-Check.

1060903, 1060905, 1084028

CSF path traversal vulnerabilities

1066013

Aggregate interface and all related interfaces flap when any of the aggregate interface configuration is changed.

1066209

SNMP MIB file check failure for FPX-4000G.

1070236

WAN Opt ports 7810 and 7802 are always exposed even when no wanopt profile is enabled.

1076622

WAD and DLP block large .exe files, but do not issue an HTTP 403.

1078472

HA works only under NAT mode, not under transparent mode.

1081878

WAD crash in wad_ssl_unsupport_block_check.

Common vulnerabilities and exposures

FortiProxy 7.0.19 is no longer vulnerable to the following CVE reference. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

985048

CVE-2024-26015

868634

CVE-2023-28002

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.0.19. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

859937, 975685

Possible wad memory leak.

996624

Explicit FTP fails to set up data channel in active mode on transparent mode.

1002558

Fix Invalid fields on policy page.

1003729

Unable to configure ha-mgmt-intf ip for FortiProxy in transparent mode.

1003898

ICAP client issue on receiving 204 response.

1015722, 1054835, 1064758

When tcp-window-type is set to auto-tuning, throughput for single file download speed falls below expectation.

1020657

Failure to establish an FTPS data channel in TP mode .

1026020

_wad_tcp_port_rebuild may leak wad_session_context object.

1035614

Unpacked variables do not match the pack layout.

1036823, 1083982

Fix some GUI issues.

1039006

Increase the maximum http2 header value length from 16 KB to 32KB to accommodate websites with a bigger header value.

1045084

Potential overrun in bmclib.c.

1047542

WAD fails to forward HTTP request with header 'accept-encoding: zstd' when strip-encoding is enabled.

1047758

Website encounters slowness and stuck issue due to http2.

1049243

Access issue after changing captive portal type.

1049784

Cannot deploy FortiProxy on ESXi 8.0 using the OVF file.

1050315

Cannot change proxy-address type in CLI when the type is referenced.

1058198, 1060782

Traffic loop caused by HA in TP mode.

1059374

Traffic cannot be forward to isolator after changing the name of the isolator in FortiProxy.

1059663

Access issue with dedicated-to management interface in HA mode in transparent mode.

1060351

Cannot visit Gmail and other websites after enabling Strict-Web-Check.

1060903, 1060905, 1084028

CSF path traversal vulnerabilities

1066013

Aggregate interface and all related interfaces flap when any of the aggregate interface configuration is changed.

1066209

SNMP MIB file check failure for FPX-4000G.

1070236

WAN Opt ports 7810 and 7802 are always exposed even when no wanopt profile is enabled.

1076622

WAD and DLP block large .exe files, but do not issue an HTTP 403.

1078472

HA works only under NAT mode, not under transparent mode.

1081878

WAD crash in wad_ssl_unsupport_block_check.

Common vulnerabilities and exposures

FortiProxy 7.0.19 is no longer vulnerable to the following CVE reference. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

985048

CVE-2024-26015

868634

CVE-2023-28002