Source: golang-github-notaryproject-notation-go
Version: 1.2.1-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for 
golang-github-notaryproject-notation-go.

CVE-2024-56138[0]:
| notion-go is a collection of libraries for supporting sign and
| verify OCI artifacts. Based on Notary Project specifications. This
| issue was identified during Quarkslab's audit of the timestamp
| feature. During the timestamp signature generation, the revocation
| status of the certificate(s) used to generate the timestamp
| signature was not verified. During timestamp signature generation,
| notation-go did not check the revocation status of the certificate
| chain used by the TSA. This oversight creates a vulnerability that
| could be exploited through a Man-in-The-Middle attack. An attacker
| could potentially use a compromised, intermediate, or revoked leaf
| certificate to generate a malicious countersignature, which would
| then be accepted and stored by `notation`. This could lead to denial
| of service scenarios, particularly in CI/CD environments during
| signature verification processes because timestamp signature would
| fail due to the presence of a revoked certificate(s) potentially
| disrupting operations. This issue has been addressed in release
| version 1.3.0-rc.2 and all users are advised to upgrade. There are
| no known workarounds for this vulnerability.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-56138
    https://www.cve.org/CVERecord?id=CVE-2024-56138
[1] 
https://github.com/notaryproject/notation-go/security/advisories/GHSA-45v3-38pc-874v
[2] 
https://github.com/notaryproject/notation-go/commit/e7005a6d13e5ba472d4e166fbb085152f909e102

Regards,
Salvatore

Reply via email to