Denial of Service (DoS) Affecting github.com/kyverno/kyverno/pkg/notary package, versions >=1.10.1 <1.11.0-beta.1


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMKYVERNOKYVERNOPKGNOTARY-6057197
  • published14 Nov 2023
  • disclosed13 Nov 2023
  • creditAdamKorcz

Introduced: 13 Nov 2023

CVE-2023-42815  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade github.com/kyverno/kyverno/pkg/notary to version 1.11.0-beta.1 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) via the Notary verifier component. An attacker can exploit this vulnerability by returning a malicious response when a request is sent to the registry.

Note:

This is only exploitable if the attacker has control over the registry from which the signatures are fetched.

The only users affected by this are those who have been building Kyverno from the source at the main branch, which is not encouraged. Users consuming official Kyverno releases are not affected.

References

CVSS Base Scores

version 3.1