๐Ÿ” CVE Alert

CVE-2023-25656

HIGH 7.5

notation-go has excessive memory allocation on verification

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.

CWE CWE-770
Vendor notaryproject
Product notation-go
Published Feb 20, 2023
Last Updated Nov 27, 2024
Stay Ahead of the Next One

Get instant alerts for notaryproject notation-go

Be the first to know when new high vulnerabilities affecting notaryproject notation-go are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

notaryproject / notation-go
1.0.0-rc.3 < 1.0.0-rc.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3 github.com: https://github.com/notaryproject/notation-go/security/advisories/GHSA-87x9-7grx-m28v