Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. net.ripe.rpki/rpki-validator-3
  4. ›
  5. GMS-2020-577

GMS-2020-577: Vulnerability in RPKI manifest validation

November 13, 2020

A vulnerability in RPKI manifest validation exists when objects on the manifest are hidden, or expired objects are replayed. An attacker successfully exploiting this vulnerability could prevent new ROAs from being received or selectively hide ROAs, causing routes to become INVALID.

To exploit this vulnerability, an attacker would need to perform a man in the middle attack on the TLS connection between the validator and an RRDP repository or perform a man in the middle attack against a rsync-only repository.

The update addresses the vulnerability by implementing validation methods from RFC 6486bis and enabling strict validation by default.

References

  • github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v
  • github.com/advisories/GHSA-q76j-58cx-wp5v

Code Behaviors & Features

Detect and mitigate GMS-2020-577 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.2-2020.10.28.22.25

Fixed versions

  • 3.2-2020.10.28.23.06

Solution

Upgrade to version 3.2-2020.10.28.23.06 or above.

Source file

maven/net.ripe.rpki/rpki-validator-3/GMS-2020-577.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:45 +0000.