CVE-2023-25656

CVSS V2 None CVSS V3 None
Description
notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
Overview
  • CVE ID
  • CVE-2023-25656
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-20T16:15:10
  • Last Modified Date
  • 2023-03-01T18:31:35
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:notation-go_project:notation-go:0.7.0:alpha1:*:*:*:*:*:* 1 OR
cpe:2.3:a:notation-go_project:notation-go:0.8.0:alpha1:*:*:*:*:*:* 1 OR
cpe:2.3:a:notation-go_project:notation-go:0.9.0:alpha1:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2023-04-17 07:59:40 Added to TrackCVE
2023-04-17 07:59:42 Weakness Enumeration new