Описание
Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, maliciously-crafted software artifacts can cause denial of service of the machine running Cosign thereby impacting all services on the machine. The root cause is that Cosign creates slices based on the number of signatures, manifests or attestations in untrusted artifacts. As such, the untrusted artifact can control the amount of memory that Cosign allocates. The exact issue is Cosign allocates excessive memory on the lines that creates a slice of the same length as the manifests. Version 2.2.4 contains a patch for the vulnerability.
A flaw was found in the Cosign package where maliciously crafted software artifacts can trigger uncontrolled resource consumption by allocating too much memory and starving out the system. A successful attack may result in a denial of service of the machine running Cosign, impacting availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| OpenShift Pipelines | openshift-pipelines-client | Affected | ||
| Red Hat Advanced Cluster Security 3 | advanced-cluster-security/rhacs-main-rhel8 | Not affected | ||
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-central-db-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-collector-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-collector-slim-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-main-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-operator-bundle | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-rhel8-operator | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-roxctl-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
| Red Hat Advanced Cluster Security 4.5 | advanced-cluster-security/rhacs-scanner-db-rhel8 | Fixed | RHSA-2024:4836 | 24.07.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.2 Medium
CVSS3
Связанные уязвимости
Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, maliciously-crafted software artifacts can cause denial of service of the machine running Cosign thereby impacting all services on the machine. The root cause is that Cosign creates slices based on the number of signatures, manifests or attestations in untrusted artifacts. As such, the untrusted artifact can control the amount of memory that Cosign allocates. The exact issue is Cosign allocates excessive memory on the lines that creates a slice of the same length as the manifests. Version 2.2.4 contains a patch for the vulnerability.
Cosign provides code signing and transparency for containers and binar ...
Cosign malicious artifacts can cause machine-wide DoS
EPSS
4.2 Medium
CVSS3