notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation inspect command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users are advised to upgrade. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 08:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/notaryproject/notation/commit/ed22fde52f6d70ae0b53521bd28c9ccafa868c24 - Patch | |
| References | () https://github.com/notaryproject/notation/security/advisories/GHSA-9m3v-v4r5-ppx7 - Vendor Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 2.6  | 
29 Feb 2024, 21:16
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:notaryproject:notation:*:*:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc2:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc5:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc1:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc4:*:*:*:go:*:*  | 
    cpe:2.3:a:notaryproject:notation-go:1.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:notaryproject:notation-go:1.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:notaryproject:notation-go:1.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:notaryproject:notation-go:1.0.0:rc4:*:*:*:*:*:* cpe:2.3:a:notaryproject:notation-go:*:*:*:*:*:*:*:* cpe:2.3:a:notaryproject:notation-go:1.0.0:rc5:*:*:*:*:*:*  | 
| First Time | 
        
        Notaryproject notation-go
         | 
16 Jun 2023, 03:58
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.7  | 
| First Time | 
        
        Notaryproject notation
         Notaryproject  | 
|
| CPE | cpe:2.3:a:notaryproject:notation:1.0.0:rc1:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc3:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc4:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:*:*:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc2:*:*:*:go:*:* cpe:2.3:a:notaryproject:notation:1.0.0:rc5:*:*:*:go:*:*  | 
|
| References | (MISC) https://github.com/notaryproject/notation/security/advisories/GHSA-9m3v-v4r5-ppx7 - Vendor Advisory | |
| References | (MISC) https://github.com/notaryproject/notation/commit/ed22fde52f6d70ae0b53521bd28c9ccafa868c24 - Patch | 
06 Jun 2023, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-06-06 19:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-33957
Mitre link : CVE-2023-33957
CVE.ORG link : CVE-2023-33957
JSON object : View
Products Affected
                notaryproject
- notation-go
 
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
