CVE-2024-56169

Publication date 18 December 2024

Last updated 9 October 2025


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

Description

A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data.

Read the notes from the security team

Status

Package Ubuntu Release Status
fort-validator 25.10 questing
Vulnerable, fix deferred
25.04 plucky
Vulnerable, fix deferred
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Vulnerable, fix deferred
22.04 LTS jammy
Vulnerable, fix deferred
20.04 LTS focal
Vulnerable, fix deferred

Notes


ej7367

As of 2025-09-29, there does not seem to be an upstream patch.

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N