Resolved issues
The following issues have been fixed in FortiSwitchOS 7.0.4. For inquiries about a particular bug, please contact Customer Service & Support.
734917 |
When you configure a PIM multicast flow with a range of group addresses for SVIs and the group address range overlaps with a dynamic IGMPv3 group receiver that has joined groups in a different VLAN, then the dynamic IGMPv3 receiver will still receive multicast traffic unexpectedly even after leaving the joined groups. |
748210 | The MAC authentication bypass (MAB) sometimes does not work on the FS-424E when a third-party hub is disconnected and then reconnected. |
759992 | After restarting the FortiSwitch unit, memory usage increases, and the user cannot access the FortiSwitch unit with the CLI or GUI. |
760536 | The SNMP trap for monitoring the power supply failure and restoration is using the wrong object identifier (OID). |
763953 | After LDAP authentication is successful, the admin user cannot log in. |
765197 | The automatic topology creates an ISL trunk between two switches with the wrong value for the native VLAN. |
769733 |
The getnext query does not work on OID .0/0.0. |
770402 | The diagnose switch mclag list command is reporting a different up time value than the diagnose switch trunk list and get system performance status commands. |
771767 | Trusted hosts with a mask other than /32 cannot access the FortiSwitch unit. |
776675 |
|
783151 |
There was an error in the definition of fsTrapLlvViolation in the SNMP MIB. |
788021 |
The |
Common vulnerabilities and exposures
FortiSwitchOS 7.0.4 is no longer vulnerable to the following CVEs:
-
CWE-329
-
CWE-347
-
CWE-916
Visit https://fortiguard.com/psirt for more information.