FORT Validator versions prior to 1.5.2 will crash if an RPKI CA publishes an X.509 EE certificate. This will lead to RTR clients such as BGP routers to lose access to the RPKI VRP data set, effectively disabling Route Origin Validation.
References
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/NICMx/FORT-validator/commit/274dc14aed1eb9b3350029d1063578a6b9c77b54 - | |
References | () https://github.com/NICMx/FORT-validator/commit/425e0f4037b4543fe8044ac96ca71d6d02d7d8c5 - | |
References | () https://github.com/NICMx/FORT-validator/commit/673c679b6bf3f4187cd5242c31a795bf8a6c22b3 - | |
References | () https://github.com/NICMx/FORT-validator/commit/eb68ebbaab50f3365aa51bbaa17cb862bf4607fa - | |
References | () https://github.com/NICMx/FORT-validator/releases/tag/1.5.2 - Patch, Release Notes, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5033 - Third Party Advisory |
07 Dec 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-11-09 13:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43114
Mitre link : CVE-2021-43114
CVE.ORG link : CVE-2021-43114
JSON object : View
Products Affected
fort_validator_project
- fort_validator
debian
- debian_linux
CWE