Fortinet white logo
Fortinet white logo
7.6.0

Resolved issues

Resolved issues

The resolved issues listed do not list every bug that has been corrected with this release. For inquiries about a particular bug, contact Customer Service & Support.

Bug ID

Description

992967 TLS session resumption using session ID does not work when DPI is enabled.
1074608 Certificate verification failures occur when FNBAM errors are mistakenly treated as untrusted certificates instead of verification failures.
1075613 FortiOS denies legitimate traffic matching app="Acrobat.Cloud" and saasinfo=11 .
1093456 First trace route packet is dropped when using FortiGate next generation firewall (NGFW) policy-based mode with virtual wire pair due to improper ICMP error packet handling.
1097216 FortiOS cannot detect https://www.virusanalyst.com/eicar.zip in flow mode and deep inspection.
1097687 A corner case pertaining to a specific URL pattern causes unexpected behavior in IPS engine.
1098473 TLS active probe is not seen with sni-server-cert-check disabled on IPS Engine.
1108238 Entry level FortiGate models may enter extreme low memory mode due to high memory usage during IPS engine database reloads.
1112737 DNS translation fails to process all requests due to packet sizing issue while using flow-based mode.
1113201

SSL protocol error occurs when FortiOS incorrectly handles TLS 1.3 session IDs during flow-based deep inspection of client-to-proxy and proxy-to-Internet traffic.

1113473 Traffic logs for tunneled traffic include inner packet details instead of outer session information when an IPS signature triggers.
1116920 Unexpected behavior observed in IPS engine (7.004.559) after upgrading from version 7.0.8 to 7.4.6.
1117043 After upgrade, event log shows logdesc="IPSA driver update failed" msg="Fail to update IPSA driver status!".
1122188 Internal diagnostic commands fail or are delayed when ipsmonitor processes each request sequentially due to sequential forwarding to IPS daemon processes.

1130821

Incomplete log entries occur when attack context logging is enabled for attacks involving long user-agent strings.

1131911 Memory usage issue observed in IPSEngine 7.00560 during high SMTP traffic due to improper memory management
1133054 Network slowness and random RDP connection drops in NGFW mode due to memory allocation error
1136945 TLS 1.3 sessions fail after certificate verification during initial website access
1139653 IPS on hold signatures show internal IPS signatures on CLI

Resolved issues

Resolved issues

The resolved issues listed do not list every bug that has been corrected with this release. For inquiries about a particular bug, contact Customer Service & Support.

Bug ID

Description

992967 TLS session resumption using session ID does not work when DPI is enabled.
1074608 Certificate verification failures occur when FNBAM errors are mistakenly treated as untrusted certificates instead of verification failures.
1075613 FortiOS denies legitimate traffic matching app="Acrobat.Cloud" and saasinfo=11 .
1093456 First trace route packet is dropped when using FortiGate next generation firewall (NGFW) policy-based mode with virtual wire pair due to improper ICMP error packet handling.
1097216 FortiOS cannot detect https://www.virusanalyst.com/eicar.zip in flow mode and deep inspection.
1097687 A corner case pertaining to a specific URL pattern causes unexpected behavior in IPS engine.
1098473 TLS active probe is not seen with sni-server-cert-check disabled on IPS Engine.
1108238 Entry level FortiGate models may enter extreme low memory mode due to high memory usage during IPS engine database reloads.
1112737 DNS translation fails to process all requests due to packet sizing issue while using flow-based mode.
1113201

SSL protocol error occurs when FortiOS incorrectly handles TLS 1.3 session IDs during flow-based deep inspection of client-to-proxy and proxy-to-Internet traffic.

1113473 Traffic logs for tunneled traffic include inner packet details instead of outer session information when an IPS signature triggers.
1116920 Unexpected behavior observed in IPS engine (7.004.559) after upgrading from version 7.0.8 to 7.4.6.
1117043 After upgrade, event log shows logdesc="IPSA driver update failed" msg="Fail to update IPSA driver status!".
1122188 Internal diagnostic commands fail or are delayed when ipsmonitor processes each request sequentially due to sequential forwarding to IPS daemon processes.

1130821

Incomplete log entries occur when attack context logging is enabled for attacks involving long user-agent strings.

1131911 Memory usage issue observed in IPSEngine 7.00560 during high SMTP traffic due to improper memory management
1133054 Network slowness and random RDP connection drops in NGFW mode due to memory allocation error
1136945 TLS 1.3 sessions fail after certificate verification during initial website access
1139653 IPS on hold signatures show internal IPS signatures on CLI