CVE-2024-56170 Affecting fort-validator package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-FORTVALIDATOR-8528154
  • published19 Dec 2024
  • disclosed18 Dec 2024

Introduced: 18 Dec 2024

NewCVE-2024-56170  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable fort-validator.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fort-validator package and not the fort-validator package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI manifests are listings of relevant files that clients are supposed to verify. Assuming everything else is correct, the most recent version of a manifest should be prioritized over other versions, to prevent replays, accidental or otherwise. Manifests contain the manifestNumber and thisUpdate fields, which can be used to gauge the relevance of a given manifest, when compared to other manifests. The former is a serial-like sequential number, and the latter is the date on which the manifest was created. However, the product does not compare the up-to-dateness of the most recently fetched manifest against the cached manifest. As such, it's prone to a rollback to a previous version if it's served a valid outdated manifest. This leads to outdated route origin validation.