SonicOS/X 7.0.1 Release Notes

Version 7.0.1-5030-R945 May 2022

May 2022

This version of SonicOS7.0.1 (7.0.1-5030-R945) is a maintenance release for currently shipping NSsp 15700 platform and resolves issues found in previous releases.

Supported Platforms

This release applies only to the NSsp 15700 platform.

For information about the release related to other platforms, please see Version 7.0.1-5030 December/October 2021.

Resolved Issues

Issue ID Issue Description
GEN7-29058 A wildcard FQDN object will not resolve subdomains unless a www FQDN object is also created.
GEN7-29777 The web management interface may refresh very slowly when the User Group page contains more than 2800 user groups.
GEN7-29262 Traffic may fail to pass through the VPN tunnel interface for tunnel VPN policies established on non-master blades when the VPN is bound to a VLAN and parent interface of the VLAN is unassigned.
GEN7-30021 Incorrect IPv6 addresses are displayed for logged-in users on the User Status page.
GEN7-30065 Trying to manually log out users in the web management interface after they are populated and active displays the error: command 'killuser ...' does not match.
GEN7-30459 On LDAP User Import page, only the first LDAP Group displays any users when user groups are read from the LDAP Server.
GEN7-30599 Unnecessary warning of the lock gBkupTaskMutex is displayed on console for tRemoteBackupd.
GEN7-30681 The packet monitor settings on the standby firewall display the primary configuration instead of the runtime configuration.
GEN7-30716 When importing settings for High Availability the error Failed to create cloned ifList is displayed because of a synchronization issue .
GEN7-30743 The network security appliance may reboot when a command-line interface (CLI) stage was destroyed unexpectedly when accessing data.
GEN7-30786 In the web management interface, administrators cannot browse through the full list of NAT policies.
GEN7-30787 Users are displayed as being inactive when traffic sourced from a user IP is crossing the network security appliance when SSO agent, TSA, or NTLM are enabled.
GEN7-30789 A crash may be encountered on the primary network security appliance after disabling High Availability because of attempting to synchronize an SSO failure report to the master blade.
GEN7-31032 The error Cannot read property 'id' of undefined displays when adding a custom match object.
GEN7-31244 When trying to create decryption policy using an LDAP imported group, the error Cannot read properties of undefined (reading 'success') is displayed.
GEN7-31260 The network security appliance may reboot when TSR is pulled on units in High Availability.
GEN7-31262 The Content Filtering Service (CFS) server is not reachable from a standby unit in a High Availability pair because the request was not using the monitoring IP address of its related interface.
GEN7-31289 In a High Availability pair, the secondary unit may reboot due to settings becoming unsynchronized after clearing packet capture.
GEN7-31625 In a High Availability pair, the primary unit's VLAN interface MAC address of a static LAG pair is being published also from the secondary unit's secondary LAG interface into the directly connected switch port, displaying an error during setup: evpn duplicate mac dampening detected.
GEN7-31803 SonicOS shuts down and reboots due to a segmentation fault.
GEN7-31805 Stateful Synchronization requires 40 minutes to be ready after the Control Interface is unplugged or plugged in, resulting from the retransmission of High Availability settings synchronization having too many duplicate synchronization packets
GEN7-31835 Enabling packet capture on the primary unit in a High Availability pair may trigger a segmentation fault and the secondary unit becomes stuck in High Availability synchronization mode even though the primary unit was rebooting.
GEN7-31889 Stack-based buffer overflow in SonicOS potentially resulting in Denial-of-Service (DoS).
GEN7-31890 Potential exposure of sensitive information to an unauthorized user via SNMP.
GEN7-31990 Potential exposure of Wireless Access Point (WAP) sensitive information via SNMP.
GEN7-31991 Improper restriction of TCP communication channel potentially resulting in Denial-of-Service (DoS).
GEN7-31992 Allocation of resources without limits or throttling can potentially result in HTTP DoS via the Content Filtering Service (CFS).
GEN7-31994 Unnecessary tNetObjMgr stack traces are displayed on the console.
GEN7-32023 Using packet capture or diagnostic tools on the primary unit in a High Availability pair triggers a synchronization of the settings.
GEN7-32163 Some decryption policies are missing, and the order of the policies is changed, upon failover from a primary unit to a secondary unit in a High Availability pair.
GEN7-32418 The OpenSSL library can enter an infinite loop when parsing an invalid certificate, potentially resulting in Denial-of-Service (DoS).
GEN7-32540 A crash may be seen with a stacktrace for DP-engine-0 in a High Availability Pair causing failover when running a heavy load of mixed traffic, UDP traffic, and OSPF routes when DPI-SSL Decryption Policies and Bandwidth Management are configured.
GEN7-32620 A crash may be seen with a stacktrace for delayedLog.c in a High Availability Pair causing failover when running a heavy load of mixed traffic, UDP traffic, and OSPF routes when DPI-SSL Decrytion Policies and Bandwidth Management are configured.

Additional References

The following additional resolved issues in this release are listed here for reference:

GEN7-32215, GEN7-32032, GEN7-31993, GEN7-31953, GEN7-31931, GEN7-31803, GEN7-31636, GEN7-31297, GEN7-30536, GEN7-28170

Known Issues

Issue ID Issue Description
GEN7-30509 Booting uploaded firmware in a High Availability pair succeeds, but triggers an audit log that indicates that upload has failed.
GEN7-30559 The network security appliance may reboot when importing of a large number of LDAP users.
GEN7-31119 On the Packet Monitor and Connection Monitor pages, some initiator and responder routes are getting swapped in the display.
GEN7-31421 There is a maximum string length of 100 characters for the input fields for the source and destination addresses within the Monitor Filter tab for packet capturing. This is not enough characters to allow up to ten IP addresses to be entered in those fields as described in the informational tip.
GEN7-32518 Slow throughput may be experienced during TFTP.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden