Source: cosign
Version: 2.5.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/sigstore/cosign/pull/4623
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cosign.

CVE-2026-22703[0]:
| Cosign provides code signing and transparency for containers and
| binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be
| crafted to successfully verify an artifact even if the embedded
| Rekor entry does not reference the artifact's digest, signature or
| public key. When verifying a Rekor entry, Cosign verifies the Rekor
| entry signature, and also compares the artifact's digest, the user's
| public key from either a Fulcio certificate or provided by the user,
| and the artifact signature to the Rekor entry contents. Without
| these comparisons, Cosign would accept any response from Rekor as
| valid. A malicious actor that has compromised a user's identity or
| signing key could construct a valid Cosign bundle by including any
| arbitrary Rekor entry, thus preventing the user from being able to
| audit the signing event. This issue has been patched in versions
| 2.6.2 and 3.0.4.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-22703
    https://www.cve.org/CVERecord?id=CVE-2026-22703
[1] https://github.com/sigstore/cosign/pull/4623
[2] https://github.com/sigstore/cosign/security/advisories/GHSA-whqx-f9j3-ch6m
[3] 
https://github.com/sigstore/cosign/commit/3ade80c5f77cefc904f8c994e88618e5892e8f1c
    
https://github.com/sigstore/cosign/commit/6832fba4928c1ad69400235bbc41212de5006176

Regards,
Salvatore

Reply via email to