CVE-2023-25656

notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:notation-go_project:notation-go:0.7.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:notation-go_project:notation-go:0.8.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:notation-go_project:notation-go:0.9.0:alpha1:*:*:*:*:*:*

Information

Published : 2023-02-20 08:15

Updated : 2023-03-01 10:31


NVD link : CVE-2023-25656

Mitre link : CVE-2023-25656


JSON object : View

CWE
CWE-770

Allocation of Resources Without Limits or Throttling

Advertisement

dedicated server usa

Products Affected

notation-go_project

  • notation-go