Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/sigstore/cosign: CVE-2022-36056 #998

Closed
GoVulnBot opened this issue Sep 14, 2022 · 3 comments
Assignees

Comments

@GoVulnBot
Copy link

CVE-2022-36056 references github.com/sigstore/cosign, which may be a Go module.

Description:
Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.

References:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/sigstore/cosign
    packages:
      - package: cosign
description: |
    Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.
cves:
  - CVE-2022-36056
references:
  - web: https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388
  - fix: https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25

@tatianab tatianab assigned rolandshoemaker and unassigned julieqiu Sep 21, 2022
@tatianab tatianab self-assigned this Sep 28, 2022
@tatianab tatianab added excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. and removed NeedsReport labels Oct 3, 2022
@tatianab
Copy link
Contributor

tatianab commented Oct 3, 2022

Vulnerability in tool

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/438179 mentions this issue: data/excluded: add GO-2022-0998.yaml for CVE-2022-36056

@zpavlinovic zpavlinovic self-assigned this Nov 9, 2023
@zpavlinovic zpavlinovic added NeedsReport and removed excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. labels Nov 9, 2023
@zpavlinovic zpavlinovic reopened this Nov 9, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/540975 mentions this issue: data/reports: add GO-2022-0998.yaml

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants