An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
[
    {
        "signature_type": "Line",
        "source": "https://github.com/nicmx/fort-validator/commit/554c5fa738791173dbf8261d68b4515708fc70ce",
        "deprecated": false,
        "id": "CVE-2024-45235-02f74911",
        "target": {
            "file": "src/print_file.c"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "147889449138784577634602238466759049575",
                "269493755503718693970132359291416060958",
                "183467428597507957592080802613304264921",
                "327584951224570290483511414756764349834"
            ],
            "threshold": 0.9
        }
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/nicmx/fort-validator/commit/554c5fa738791173dbf8261d68b4515708fc70ce",
        "deprecated": false,
        "id": "CVE-2024-45235-5bd24603",
        "target": {
            "file": "test/tal_test.c"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "50989219936941618529196440800405028605",
                "68482305505019198037374393097522654354",
                "245080040670023987538169387390987987000",
                "24442718220132759855911218662021834770"
            ],
            "threshold": 0.9
        }
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/nicmx/fort-validator/commit/554c5fa738791173dbf8261d68b4515708fc70ce",
        "deprecated": false,
        "id": "CVE-2024-45235-6cef58de",
        "target": {
            "file": "test/types/uri_test.c"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "244406567224100079130832236358206550568",
                "192874625895839078802782519432191710424",
                "8368202350100797008376123573611711471",
                "187673777030990722610105519276335209648"
            ],
            "threshold": 0.9
        }
    },
    {
        "signature_type": "Line",
        "source": "https://github.com/nicmx/fort-validator/commit/554c5fa738791173dbf8261d68b4515708fc70ce",
        "deprecated": false,
        "id": "CVE-2024-45235-6e166c3c",
        "target": {
            "file": "test/mock.c"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "117657757624396647050250919369354447007",
                "238967847734869426782602542933290486653",
                "231970757348571404241512985359370383534",
                "66094430273658645673717399424594708253"
            ],
            "threshold": 0.9
        }
    },
    {
        "signature_type": "Function",
        "source": "https://github.com/nicmx/fort-validator/commit/554c5fa738791173dbf8261d68b4515708fc70ce",
        "deprecated": false,
        "id": "CVE-2024-45235-99bea718",
        "target": {
            "function": "rsync2bio_tmpdir",
            "file": "src/print_file.c"
        },
        "signature_version": "v1",
        "digest": {
            "function_hash": "262246466360906216192910747803551172805",
            "length": 548.0
        }
    }
]