CVE-2023-25656

notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:notaryproject:notation-go:0.7.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:notaryproject:notation-go:0.8.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:notaryproject:notation-go:0.9.0:alpha1:*:*:*:*:*:*

History

No history.

Information

Published : 2023-02-20 16:15

Updated : 2024-02-29 21:18


NVD link : CVE-2023-25656

Mitre link : CVE-2023-25656

CVE.ORG link : CVE-2023-25656


JSON object : View

Products Affected

notaryproject

  • notation-go
CWE
CWE-770

Allocation of Resources Without Limits or Throttling