CVE-2024-45238
Publication date 24 August 2024
Last updated 9 October 2025
Ubuntu priority
Cvss 3 Severity Score
Description
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a bit string that doesn't properly decode into a Subject Public Key. OpenSSL does not report this problem during parsing, and when compiled with OpenSSL libcrypto versions below 3, Fort recklessly dereferences the pointer. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
Status
Package | Ubuntu Release | Status |
---|---|---|
fort-validator | 25.10 questing |
Not affected
|
25.04 plucky |
Not affected
|
|
24.04 LTS noble |
Fixed 1.6.1-1ubuntu0.1~esm2
|
|
22.04 LTS jammy |
Fixed 1.5.3-1ubuntu0.1
|
|
20.04 LTS focal |
Fixed 1.2.0-1ubuntu0.1~esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialSeverity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7813-1
- FORT Validator vulnerabilities
- 8 October 2025