Skip to content

Commit b819b6a

Browse files
committed
data/reports: add GO-2023-2181.yaml
Aliases: CVE-2023-46737, GHSA-vfp6-jrw2-99g9 Fixes #2181 Change-Id: Ib4c7b465171880b254fbfa6e9a2b4fc3b44d2655 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/540896 Reviewed-by: Tatiana Bradley <[email protected]> Run-TryBot: Zvonimir Pavlinovic <[email protected]> TryBot-Result: Gopher Robot <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent bcaf600 commit b819b6a

File tree

2 files changed

+110
-0
lines changed

2 files changed

+110
-0
lines changed

data/osv/GO-2023-2181.json

+82
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-2181",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-46737",
8+
"GHSA-vfp6-jrw2-99g9"
9+
],
10+
"summary": "Denial of service attack from remote registry in github.com/sigstore/cosign",
11+
"details": "An attacker who controls a remote registry can return a high number of attestations and/or signatures to cosign. This can cause cosign to enter a long loop resulting in a denial of service, i.e., endless data attack.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/sigstore/cosign",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
}
25+
]
26+
}
27+
],
28+
"ecosystem_specific": {
29+
"imports": [
30+
{
31+
"path": "github.com/sigstore/cosign/pkg/cosign",
32+
"symbols": [
33+
"FetchSignaturesForReference"
34+
]
35+
}
36+
]
37+
}
38+
},
39+
{
40+
"package": {
41+
"name": "github.com/sigstore/cosign/v2",
42+
"ecosystem": "Go"
43+
},
44+
"ranges": [
45+
{
46+
"type": "SEMVER",
47+
"events": [
48+
{
49+
"introduced": "0"
50+
},
51+
{
52+
"fixed": "2.2.1"
53+
}
54+
]
55+
}
56+
],
57+
"ecosystem_specific": {
58+
"imports": [
59+
{
60+
"path": "github.com/sigstore/cosign/v2/pkg/cosign",
61+
"symbols": [
62+
"FetchSignaturesForReference"
63+
]
64+
}
65+
]
66+
}
67+
}
68+
],
69+
"references": [
70+
{
71+
"type": "FIX",
72+
"url": "https://github.com/sigstore/cosign/commit/8ac891ff0e29ddc67965423bee8f826219c6eb0f"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.1"
77+
}
78+
],
79+
"database_specific": {
80+
"url": "https://pkg.go.dev/vuln/GO-2023-2181"
81+
}
82+
}

data/reports/GO-2023-2181.yaml

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: GO-2023-2181
2+
modules:
3+
- module: github.com/sigstore/cosign
4+
vulnerable_at: 1.13.1
5+
packages:
6+
- package: github.com/sigstore/cosign/pkg/cosign
7+
symbols:
8+
- FetchSignaturesForReference
9+
- module: github.com/sigstore/cosign/v2
10+
versions:
11+
- fixed: 2.2.1
12+
vulnerable_at: 2.2.0
13+
packages:
14+
- package: github.com/sigstore/cosign/v2/pkg/cosign
15+
symbols:
16+
- FetchSignaturesForReference
17+
summary: Denial of service attack from remote registry in github.com/sigstore/cosign
18+
description: |-
19+
An attacker who controls a remote registry can return a high number of
20+
attestations and/or signatures to cosign. This can cause cosign to enter
21+
a long loop resulting in a denial of service, i.e., endless data attack.
22+
cves:
23+
- CVE-2023-46737
24+
ghsas:
25+
- GHSA-vfp6-jrw2-99g9
26+
references:
27+
- fix: https://github.com/sigstore/cosign/commit/8ac891ff0e29ddc67965423bee8f826219c6eb0f
28+
- web: https://github.com/sigstore/cosign/releases/tag/v2.2.1

0 commit comments

Comments
 (0)