-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 29 Mar 2025 03:13:08 +0100 Source: fort-validator Binary: fort-validator fort-validator-dbgsym Architecture: mipsel Version: 1.5.4-1+deb12u1 Distribution: bookworm Urgency: medium Maintainer: mipsel Build Daemon (mipsel-osuosl-05) Changed-By: Daniel Leidert Description: fort-validator - RPKI validator and RTR server Changes: fort-validator (1.5.4-1+deb12u1) bookworm; urgency=medium . * Non-maintainer upload by the Debian LTS Team. * d/control (Build-Depends): Add rsync for running tests. * d/patches/CVE-2024-45234.patch: Add patch to fix CVE-2024-45234. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a signedAttrs encoded in non-canonical form. This bypasses Fort's BER decoder, reaching a point in the code that panics when faced with data not encoded in DER. Because Fort is an RPKI Relying Party, a panic can lead to Route Origin Validation unavailability, which can lead to compromised routing. * d/patches/CVE-2024-45235.patch: Add patch to fix CVE-2024-45235. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing. * d/patches/CVE-2024-45236.patch: Add patch to fix CVE-2024-45236. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a signed object containing an empty signedAttributes field. Fort accesses the set's elements without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing. * d/patches/CVE-2024-45237.patch: Add patch to fix CVE-2024-45237. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow. * d/patches/CVE-2024-45238.patch: Add patch to fix CVE-2024-45238. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing. * d/patches/CVE-2024-45239.patch: Add patch to fix CVE-2024-45239. - A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing. * d/patches/CVE-2024-48943.patch: Add patch to fix CVE-2024-48943. - A malicious RPKI rsync repository can prevent Fort from finishing its validation run by drip-feeding its content. This can lead to delayed validation and a stale or unavailable Route Origin Validation. (thanks to Jochen Sprickerhof for helping backporting the test case) Checksums-Sha1: 327d8f9ec87b92573d97b1af823f3d54f1c2ebf4 634844 fort-validator-dbgsym_1.5.4-1+deb12u1_mipsel.deb ab0256a0b5166af990655f614940df1fd24d9400 7050 fort-validator_1.5.4-1+deb12u1_mipsel-buildd.buildinfo cb27d19f1317a62ce3cf1221d84186ea71327727 183980 fort-validator_1.5.4-1+deb12u1_mipsel.deb Checksums-Sha256: 1959dcdc26660315bef611e7b693b3f3942fdb6d4373087f8cd889ce9a41b42f 634844 fort-validator-dbgsym_1.5.4-1+deb12u1_mipsel.deb 386cd3edae5cbc2e1690f6b02cafc8444a6155c63359d85e45f712cd0015e253 7050 fort-validator_1.5.4-1+deb12u1_mipsel-buildd.buildinfo 24477e7aa2f5db0ce37cbc836238abcb5a03ca93ea785744275533678e67f7a2 183980 fort-validator_1.5.4-1+deb12u1_mipsel.deb Files: d2c1a39a982d3c8632165fc24325868d 634844 debug optional fort-validator-dbgsym_1.5.4-1+deb12u1_mipsel.deb 1ce676a9e1a323082b9017cccfb46085 7050 net optional fort-validator_1.5.4-1+deb12u1_mipsel-buildd.buildinfo 70e5225ef0a7855dfaebb5d19a5fc2e7 183980 net optional fort-validator_1.5.4-1+deb12u1_mipsel.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEYLhEzFkGpb3yYRVHmlVdU6AM9BUFAmhpVvoACgkQmlVdU6AM 9BUWuRAAsVPieb629Ws2bkk8EEpwJHRtERIi6OWX/wAxYpMlYBv3kVZ1HRj7OaZ8 H/pHZRqRHq3ptE5Cmz2AvDl6B2Wg1xzpGGUXekbcM7XNKJosEfJfoFDgpUbLOsl/ LirrbwHeWk9xIDIsPx3RJviEqgR+XkYVTZCIwtp18aJxL5dXhSoDluX1dpWywlfn GdIOcn9HH0dFe0bHsqjRBBbGNH/XU5ZK45d6BwDNes02+bg1hfRrhcLnza38marJ hlzuRtKpxCRtIXbYWlKc8Qnpso0EcbKtpUVxmi/nkZK+6zb61J9l02z2I/yn0X0G T5y/JZdvp6Pn6+fm7QA+sKiFrup+C5ZMUTrpjDAkUDI8UqY/qIqsJ8VlLeFyKdve gmxMW1FctbY+MntQiB2EudDam9MENsbzWYqyfcM+Wd6J+SNUuljZ0cX+5nsYmO1V 9rjw+7+ZVGvfEWUw0FnzfWxtBZQWb8P8XQec258jRSdTH9lY3pB0cQSomWLoh/Ga VNuUDg7F1XDFqrezMdFr6biDfQgJlbeXrcnEtJ+MZF6h13Xjw6NoadS3Q7WW15pR 4uy90OQMO2GHPfape7SzOyIAuQBq+A5q6G/MQsJJWgZOuQNFi5g1qA9wZBTdzfvE siE2DebdOJ3HpGRDwaGhjU5ndGs57OuPrBMLAfgpyYVxXOdghJo= =UMIN -----END PGP SIGNATURE-----