notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3 | Release Notes | 
| https://github.com/notaryproject/notation-go/security/advisories/GHSA-87x9-7grx-m28v | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2023-02-20 16:15
Updated : 2024-02-29 21:18
NVD link : CVE-2023-25656
Mitre link : CVE-2023-25656
CVE.ORG link : CVE-2023-25656
JSON object : View
Products Affected
                notaryproject
- notation-go
 
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
