Vulnerability Report: GO-2023-1589
- CVE-2023-25656, GHSA-87x9-7grx-m28v
- Affects: github.com/notaryproject/notation-go
- Published: Jul 11, 2023
Parsing PKIX distinguished names containing the string "=#" can cause excessive memory consumption.
Affected Packages
-
PathVersionsSymbols
-
before v1.0.0-rc.3
-
before v1.0.0-rc.3
-
before v1.0.0-rc.3
Aliases
References
Feedback
See anything missing or incorrect?
Suggest an edit to this report.