First published: Wed Jan 22 2025(Updated: )
The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator.
Credit: sep@nlnetlabs.nl
Affected Software | Affected Version | How to fix |
---|---|---|
NLnet Labs Routinator |
This issue is fixed in 0.14.1 and all later versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0638 is classified as a moderate severity vulnerability due to its potential to cause a crash of the Routinator software.
To fix CVE-2025-0638, ensure that you are using the latest version of NLnet Labs Routinator, which addresses the manifest file checking issue.
CVE-2025-0638 can lead to a crash in Routinator when it encounters illegal characters in file names, impacting the stability of the software.
Currently, the best approach for CVE-2025-0638 is to upgrade to the patched version of Routinator as no direct workarounds are available.
CVE-2025-0638 affects all users of NLnet Labs Routinator using versions prior to the release that mitigates this vulnerability.