<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2022-23649</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2022-23649</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>8</Number>
        <Date>2023-06-12T23:27:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-02-22T02:47:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-06-12T23:27:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2022-23649</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Retail Branch Server 4.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4" CPE="cpe:/o:suse:sle-module-basesystem:15:sp4">SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cosign">
      <FullProductName ProductID="cosign" CPE="cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*">cosign</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cosign-1.12.0-150400.3.6.1">
      <FullProductName ProductID="cosign-1.12.0-150400.3.6.1" CPE="cpe:2.3:a:sigstore:cosign:1.12.0:*:*:*:*:*:*:*">cosign-1.12.0-150400.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cosign-1.5.2-1.1">
      <FullProductName ProductID="cosign-1.5.2-1.1" CPE="cpe:2.3:a:sigstore:cosign:1.5.2:*:*:*:*:*:*:*">cosign-1.5.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cosign-1.5.2-150400.1.7">
      <FullProductName ProductID="cosign-1.5.2-150400.1.7" CPE="cpe:2.3:a:sigstore:cosign:1.5.2:*:*:*:*:*:*:*">cosign-1.5.2-150400.1.7</FullProductName>
    </Branch>
    <Relationship ProductReference="cosign-1.5.2-150400.1.7" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4:cosign-1.5.2-150400.1.7">cosign-1.5.2-150400.1.7 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="cosign-1.12.0-150400.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:cosign-1.12.0-150400.3.6.1">cosign-1.12.0-150400.3.6.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cosign-1.5.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cosign-1.5.2-1.1">cosign-1.5.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cosign" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP4:cosign">cosign as a component of SUSE Linux Enterprise Module for Basesystem 15 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.</Note>
    </Notes>
    <CVE>CVE-2022-23649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP4:cosign-1.5.2-150400.1.7</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:cosign-1.12.0-150400.3.6.1</ProductID>
        <ProductID>openSUSE Tumbleweed:cosign-1.5.2-1.1</ProductID>
      </Status>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP4:cosign</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>2.1</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:P/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
