Debian Package Tracker
Register | Log in
Subscribe

golang-github-notaryproject-notation-go

Sign and verify OCI artifacts (library)

Choose email to subscribe with

general
  • source: golang-github-notaryproject-notation-go (main)
  • version: 1.3.2-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Reinhard Tartler [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • testing: 1.3.2-1
  • unstable: 1.3.2-1
versioned links
  • 1.3.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-notaryproject-notation-go-dev
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2024-56138: notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2025-01-21 Last update: 2025-11-03 17:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2024-56138: notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2025-11-03 Last update: 2025-11-03 17:30
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2024-56138: notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Created: 2025-01-21 Last update: 2025-06-04 03:35
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-11-03 Last update: 2025-11-16 15:46
debian/patches: 1 patch to forward upstream low

Among the 4 debian patches available in version 1.3.2-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-12-18 Last update: 2025-11-01 13:32
news
[rss feed]
  • [2025-11-04] golang-github-notaryproject-notation-go 1.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-04] golang-github-notaryproject-notation-go 1.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-01] Accepted golang-github-notaryproject-notation-go 1.3.2-1 (source) into unstable (Simon Josefsson)
  • [2025-07-27] golang-github-notaryproject-notation-go REMOVED from testing (Debian testing watch)
  • [2025-06-04] golang-github-notaryproject-notation-go 1.2.1-4 MIGRATED to testing (Debian testing watch)
  • [2025-06-01] Accepted golang-github-notaryproject-notation-go 1.2.1-5 (source) into experimental (Reinhard Tartler)
  • [2025-05-14] Accepted golang-github-notaryproject-notation-go 1.2.1-4 (source) into unstable (Santiago Vila)
  • [2024-12-31] golang-github-notaryproject-notation-go 1.2.1-3 MIGRATED to testing (Debian testing watch)
  • [2024-12-27] Accepted golang-github-notaryproject-notation-go 1.2.1-3 (source) into unstable (Reinhard Tartler)
  • [2024-12-26] Accepted golang-github-notaryproject-notation-go 1.2.1-2 (source) into unstable (Reinhard Tartler)
  • [2024-12-17] Accepted golang-github-notaryproject-notation-go 1.2.1-1 (all source) into unstable (Debian FTP Masters) (signed by: Reinhard Tartler)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.3.2-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing