CVE-2023-33959: Improper Verification of Cryptographic Signature
(updated )
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry can cause users to verify the wrong artifact. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation-go library to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
References
- github.com/advisories/GHSA-xhg5-42rf-296r
- github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64
- github.com/notaryproject/notation-go/commit/eba60f5aed9c9e05dee55324423c95fe34700b4c
- github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6
- github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r
- nvd.nist.gov/vuln/detail/CVE-2023-33959
Detect and mitigate CVE-2023-33959 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →