Source: fort-validator
Version: 1.6.4+20240930-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/NICMx/FORT-validator/issues/82
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for fort-validator.

CVE-2024-56169[0]:
| A validation integrity issue was discovered in Fort through 1.6.4
| before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to
| maintain a backup cache of the remote RPKI data. This can be
| employed as a fallback in case a new fetch fails or yields incorrect
| files. However, the product currently uses its cache merely as a
| bandwidth saving tool (because fetching is performed through
| deltas). If a fetch fails midway or yields incorrect files, there is
| no viable fallback. This leads to incomplete route origin validation
| data.


CVE-2024-56170[1]:
| A validation integrity issue was discovered in Fort through 1.6.4
| before 2.0.0. RPKI manifests are listings of relevant files that
| clients are supposed to verify. Assuming everything else is correct,
| the most recent version of a manifest should be prioritized over
| other versions, to prevent replays, accidental or otherwise.
| Manifests contain the manifestNumber and thisUpdate fields, which
| can be used to gauge the relevance of a given manifest, when
| compared to other manifests. The former is a serial-like sequential
| number, and the latter is the date on which the manifest was
| created. However, the product does not compare the up-to-dateness of
| the most recently fetched manifest against the cached manifest. As
| such, it's prone to a rollback to a previous version if it's served
| a valid outdated manifest. This leads to outdated route origin
| validation.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-56169
    https://www.cve.org/CVERecord?id=CVE-2024-56169
[1] https://security-tracker.debian.org/tracker/CVE-2024-56170
    https://www.cve.org/CVERecord?id=CVE-2024-56170
[2] https://github.com/NICMx/FORT-validator/issues/82

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to