CVE-2023-25656
Published Feb 20, 2023
Last updated 9 months ago
Overview
- Description
- notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:notaryproject:notation-go:0.7.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FE9F3CB-8113-43F6-B85E-901E0F742EBD" }, { "criteria": "cpe:2.3:a:notaryproject:notation-go:0.8.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26950002-B9F0-42DE-95D9-AC4A4AA16693" }, { "criteria": "cpe:2.3:a:notaryproject:notation-go:0.9.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17AF7E20-1C25-4660-9F8F-D99AB3AE4B7F" } ], "operator": "OR" } ] } ]