Source: golang-github-notaryproject-notation-go Version: 1.2.1-3 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for golang-github-notaryproject-notation-go. CVE-2024-56138[0]: | notion-go is a collection of libraries for supporting sign and | verify OCI artifacts. Based on Notary Project specifications. This | issue was identified during Quarkslab's audit of the timestamp | feature. During the timestamp signature generation, the revocation | status of the certificate(s) used to generate the timestamp | signature was not verified. During timestamp signature generation, | notation-go did not check the revocation status of the certificate | chain used by the TSA. This oversight creates a vulnerability that | could be exploited through a Man-in-The-Middle attack. An attacker | could potentially use a compromised, intermediate, or revoked leaf | certificate to generate a malicious countersignature, which would | then be accepted and stored by `notation`. This could lead to denial | of service scenarios, particularly in CI/CD environments during | signature verification processes because timestamp signature would | fail due to the presence of a revoked certificate(s) potentially | disrupting operations. This issue has been addressed in release | version 1.3.0-rc.2 and all users are advised to upgrade. There are | no known workarounds for this vulnerability. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-56138 https://www.cve.org/CVERecord?id=CVE-2024-56138 [1] https://github.com/notaryproject/notation-go/security/advisories/GHSA-45v3-38pc-874v [2] https://github.com/notaryproject/notation-go/commit/e7005a6d13e5ba472d4e166fbb085152f909e102 Regards, Salvatore