Notation vulnerable to denial of service from high number of artifact signatures
Moderate severity
GitHub Reviewed
Published
Jun 6, 2023
in
notaryproject/notation
•
Updated Mar 1, 2024
Package
Affected versions
< 1.0.0-rc.6
Patched versions
1.0.0-rc.6
Description
Published to the GitHub Advisory Database
Jun 6, 2023
Reviewed
Jun 6, 2023
Published by the National Vulnerability Database
Jun 6, 2023
Last updated
Mar 1, 2024
Impact
An attacker who controls or compromises a registry can make the registry serve an infinite number of signatures for the artifact, causing a denial of service to the host machine running
notation verify
.Patches
The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above.
Workarounds
User should use secure and trusted container registries.
Credits
The
notation
project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing the issue found during an security audit (facilitated by OSTIF and sponsored by CNCF) and Shiwei Zhang (@shizhMSFT) for root cause analysis.References