Skip to content

Commit bcaf600

Browse files
committed
data/reports: add GO-2022-0326.yaml
Aliases: CVE-2022-23649, GHSA-ccxc-vr6p-4858 Fixes #326 Change-Id: I3a136ad5ea76cce6aff198acf8317345e841b9ac Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/540897 TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Cesar Alberto De oliveira <[email protected]> Run-TryBot: Zvonimir Pavlinovic <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 4ced7d0 commit bcaf600

File tree

3 files changed

+113
-8
lines changed

3 files changed

+113
-8
lines changed

data/excluded/GO-2022-0326.yaml

-8
This file was deleted.

data/osv/GO-2022-0326.json

+75
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0326",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2022-23649",
8+
"GHSA-ccxc-vr6p-4858"
9+
],
10+
"summary": "Improper certificate validation in github.com/sigstore/cosign",
11+
"details": "Cosign can be manipulated to claim that an entry for a signature in the OCI registry exists in the Rekor transparency log even if it does not. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and \"keyless signing\" with Fulcio certificate authority.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/sigstore/cosign",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.5.2"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/sigstore/cosign/pkg/cosign",
35+
"symbols": [
36+
"VerifyBundle",
37+
"VerifyImageAttestations",
38+
"VerifyImageSignature",
39+
"VerifyImageSignatures",
40+
"VerifyLocalImageAttestations",
41+
"VerifyLocalImageSignatures"
42+
]
43+
},
44+
{
45+
"path": "github.com/sigstore/cosign/pkg/sget",
46+
"symbols": [
47+
"SecureGet.Do"
48+
]
49+
},
50+
{
51+
"path": "github.com/sigstore/cosign/cmd/cosign/cli/verify",
52+
"symbols": [
53+
"PrintVerificationHeader",
54+
"VerifyAttestationCommand.Exec",
55+
"VerifyCommand.Exec"
56+
]
57+
}
58+
]
59+
}
60+
}
61+
],
62+
"references": [
63+
{
64+
"type": "FIX",
65+
"url": "https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://github.com/sigstore/cosign/releases/tag/v1.5.2"
70+
}
71+
],
72+
"database_specific": {
73+
"url": "https://pkg.go.dev/vuln/GO-2022-0326"
74+
}
75+
}

data/reports/GO-2022-0326.yaml

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: GO-2022-0326
2+
modules:
3+
- module: github.com/sigstore/cosign
4+
versions:
5+
- fixed: 1.5.2
6+
vulnerable_at: 1.5.1
7+
packages:
8+
- package: github.com/sigstore/cosign/pkg/cosign
9+
symbols:
10+
- VerifyBundle
11+
derived_symbols:
12+
- VerifyImageAttestations
13+
- VerifyImageSignature
14+
- VerifyImageSignatures
15+
- VerifyLocalImageAttestations
16+
- VerifyLocalImageSignatures
17+
- package: github.com/sigstore/cosign/pkg/sget
18+
symbols:
19+
- SecureGet.Do
20+
- package: github.com/sigstore/cosign/cmd/cosign/cli/verify
21+
symbols:
22+
- VerifyAttestationCommand.Exec
23+
- VerifyCommand.Exec
24+
- PrintVerificationHeader
25+
summary: Improper certificate validation in github.com/sigstore/cosign
26+
description: |-
27+
Cosign can be manipulated to claim that an entry for a signature in the OCI
28+
registry exists in the Rekor transparency log even if it does not. This requires
29+
the attacker to have pull and push permissions for the signature in OCI. This
30+
can happen with both standard signing with a keypair and "keyless signing" with
31+
Fulcio certificate authority.
32+
cves:
33+
- CVE-2022-23649
34+
ghsas:
35+
- GHSA-ccxc-vr6p-4858
36+
references:
37+
- fix: https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49
38+
- web: https://github.com/sigstore/cosign/releases/tag/v1.5.2

0 commit comments

Comments
 (0)