Improper Check or Handling of Exceptional Conditions Affecting github.com/notaryproject/notation-go/verifier/crl package, versions >=1.3.0-rc.1 <1.3.0-rc.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMNOTARYPROJECTNOTATIONGOVERIFIERCRL-8622673
  • published14 Jan 2025
  • disclosed13 Jan 2025
  • creditSébastien Rolland

Introduced: 13 Jan 2025

NewCVE-2024-51491  (opens in a new tab)
CWE-703  (opens in a new tab)

How to fix?

Upgrade github.com/notaryproject/notation-go/verifier/crl to version 1.3.0-rc.2 or higher.

Overview

Affected versions of this package are vulnerable to Improper Check or Handling of Exceptional Conditions via the os.Rename method. An attacker can cause the application to crash by exploiting operating system-specific limitations during file operations.

PoC

  1. Ensure that the temporary file storage area (e.g., /tmp) is mounted on a different mount point than the user's 'notation' cache directory.

  2. Either disable the Online Certificate Status Protocol (OCSP) revocation check, or utilize certificates that exclusively support Certificate Revocation Lists (CRLs) for revocation check.

  3. Try to verify a previously generated signature using the 'notation' tool.

References

CVSS Scores

version 4.0
version 3.1