CVE Vulnerabilities

CVE-2024-45235

NULL Pointer Dereference

Published: Aug 24, 2024 | Modified: Nov 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Fort_validatorNicmx*1.6.3 (excluding)
Fort-validatorUbuntuesm-apps/focal*
Fort-validatorUbuntuesm-apps/jammy*
Fort-validatorUbuntuesm-apps/noble*
Fort-validatorUbuntufocal*
Fort-validatorUbuntujammy*
Fort-validatorUbuntunoble*
Fort-validatorUbuntuoracular*
Fort-validatorUbuntuupstream*

Potential Mitigations

References