Описание
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.6.6-1 |
| esm-apps/focal | released | 1.2.0-1ubuntu0.1~esm1 |
| esm-apps/jammy | released | 1.5.3-1ubuntu0.1 |
| esm-apps/noble | released | 1.6.1-1ubuntu0.1~esm2 |
| focal | ignored | end of standard support, was needs-triage |
| jammy | released | 1.5.3-1ubuntu0.1 |
| noble | needed | |
| oracular | ignored | end of life, was needs-triage |
| plucky | not-affected | 1.6.6-1 |
| questing | not-affected | 1.6.6-1 |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
EPSS
7.5 High
CVSS3