Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0663 | notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`. |
Github GHSA |
GHSA-87x9-7grx-m28v | notation-go has excessive memory allocation on verification |
Wed, 27 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-27T16:45:09.132Z
Reserved: 2023-02-09T00:00:00.000Z
Link: CVE-2023-25656
Updated: 2024-08-02T11:25:19.346Z
Status : Modified
Published: 2023-02-20T16:15:10.747
Modified: 2024-11-21T07:49:52.963
Link: CVE-2023-25656
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA