[SUSE-SU-2024:0430-1] Security update for cosign
Security update for cosign
This update for cosign fixes the following issues:
Updated to 2.2.3 (jsc#SLE-23879):
Bug Fixes:
- Fix race condition on verification with multiple signatures attached to image (#3486)
- fix(clean): Fix clean cmd for private registries (#3446)
- Fixed BYO PKI verification (#3427)
Features:
- Allow for option in cosign attest and attest-blob to upload attestation as supported in Rekor (#3466)
- Add support for OpenVEX predicate type (#3405)
Documentation:
- Resolves #3088:
version
sub-command expected behaviour documentation and testing (#3447) - add examples for cosign attach signature cmd (#3468)
Misc:
- Remove CertSubject function (#3467)
Use local rekor and fulcio instances in e2e tests (#3478)
bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207)
Updated to 2.2.2 (jsc#SLE-23879):
v2.2.2 adds a new container with a shell,
gcr.io/projectsigstore/cosign:vx.y.z-dev, in addition to the existing
container gcr.io/projectsigstore/cosign:vx.y.z without a shell.
For private deployments, we have also added an alias for
--insecure-skip-log, --private-infrastructure.
Bug Fixes:
- chore(deps): bump github.com/sigstore/sigstore from 1.7.5 to 1.7.6 (#3411) which fixes a bug with using Azure KMS
- Don't require CT log keys if using a key/sk (#3415)
- Fix copy without any flag set (#3409)
- Update cosign generate cmd to not include newline (#3393)
- Fix idempotency error with signing (#3371)
Features:
- Add --yes flag cosign import-key-pair to skip the overwrite confirmation. (#3383)
- Use the timeout flag value in verify* commands. (#3391)
- add --private-infrastructure flag (#3369)
Container Updates:
- Bump builder image to use go1.21.4 and add new cosign image tags with shell (#3373)
Documentation:
Update SBOM_SPEC.md (#3358)
CVE-2023-48795: Fixed the Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207).
Package | Affected Version |
---|---|
pkg:rpm/suse/cosign?arch=x86_64&distro=opensuse-leap-15.5 | < 2.2.3-150400.3.17.1 |
pkg:rpm/suse/cosign?arch=s390x&distro=opensuse-leap-15.5 | < 2.2.3-150400.3.17.1 |
pkg:rpm/suse/cosign?arch=ppc64le&distro=opensuse-leap-15.5 | < 2.2.3-150400.3.17.1 |
pkg:rpm/suse/cosign?arch=aarch64&distro=opensuse-leap-15.5 | < 2.2.3-150400.3.17.1 |
- ID
- SUSE-SU-2024:0430-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20240430-1/
- Published
-
2024-02-08T14:03:31
(7 months ago) - Modified
-
2024-02-08T14:03:31
(7 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1898
- ALAS2-2023-2376
- ALPINE:CVE-2023-48795
- ALSA-2024:0606
- ALSA-2024:0628
- ALSA-2024:1130
- ALSA-2024:1150
- DSA-5586-1
- DSA-5588-1
- DSA-5591-1
- DSA-5599-1
- DSA-5600-1
- DSA-5601-1
- DSA-5750-1
- ELSA-2024-0606
- ELSA-2024-0628
- ELSA-2024-1130
- ELSA-2024-1150
- ELSA-2024-12157
- ELSA-2024-12158
- ELSA-2024-12164
- ELSA-2024-12232
- ELSA-2024-12233
- ELSA-2024-2988
- FEDORA-2023-0733306be9
- FEDORA-2023-153404713b
- FEDORA-2023-20feb865d8
- FEDORA-2023-55800423a8
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-e77300e4b5
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-2705241461
- FEDORA-2024-37627e432e
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-71c2c6526c
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7e301327c2
- FEDORA-2024-a53b24023d
- FEDORA-2024-ae653fb07b
- FEDORA-2024-d946b9ad25
- FEDORA-2024-fb32950d11
- FREEBSD:0F7598CC-9FE2-11EE-B47F-901B0E9408DC
- FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
- FREEBSD:4EBDD56B-FE72-11EE-BC57-00E081B7AA2D
- FREEBSD:91955195-9EBB-11EE-BC14-A703705DB3A6
- FREEBSD:B5E22EC5-BC4B-11EE-B0B5-B42E991FC52E
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202407-11
- GLSA-202407-12
- GO-2023-2402
- JENKINS:SECURITY-3333
- JENKINS:SECURITY-3386
- openSUSE-SU-2023:0411-1
- openSUSE-SU-2023:0421-1
- openSUSE-SU-2024:0005-1
- openSUSE-SU-2024:0008-1
- openSUSE-SU-2024:0036-1
- RHBA-2024:1127
- RHBA-2024:1136
- RHSA-2024:0606
- RHSA-2024:0628
- RHSA-2024:1130
- RHSA-2024:1150
- RHSA-2024:2988
- RLSA-2024:0606
- RLSA-2024:0628
- SSA:2023-353-01
- SSA:2023-354-01
- SUSE-SU-2023:4902-1
- SUSE-SU-2023:4903-1
- SUSE-SU-2023:4904-1
- SUSE-SU-2023:4905-1
- SUSE-SU-2023:4946-1
- SUSE-SU-2024:0006-1
- SUSE-SU-2024:0035-1
- SUSE-SU-2024:0140-1
- SUSE-SU-2024:0210-1
- SUSE-SU-2024:0224-1
- SUSE-SU-2024:0327-1
- SUSE-SU-2024:0460-1
- SUSE-SU-2024:0525-1
- SUSE-SU-2024:0539-1
- SUSE-SU-2024:0543-1
- SUSE-SU-2024:0558-1
- SUSE-SU-2024:0972-1
- SUSE-SU-2024:0974-1
- USN-6560-1
- USN-6560-2
- USN-6561-1
- USN-6585-1
- USN-6589-1
- USN-6598-1
- USN-6738-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0430-1.json | |
Suse | URL for SUSE-SU-2024:0430-1 | https://www.suse.com/support/update/announcement/2024/suse-su-20240430-1/ | |
Suse | E-Mail link for SUSE-SU-2024:0430-1 | https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html | |
Bugzilla | SUSE Bug 1218207 | https://bugzilla.suse.com/1218207 | |
CVE | SUSE CVE CVE-2023-48795 page | https://www.suse.com/security/cve/CVE-2023-48795/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/cosign?arch=x86_64&distro=opensuse-leap-15.5 | suse | cosign | < 2.2.3-150400.3.17.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/cosign?arch=s390x&distro=opensuse-leap-15.5 | suse | cosign | < 2.2.3-150400.3.17.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/cosign?arch=ppc64le&distro=opensuse-leap-15.5 | suse | cosign | < 2.2.3-150400.3.17.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/cosign?arch=aarch64&distro=opensuse-leap-15.5 | suse | cosign | < 2.2.3-150400.3.17.1 | opensuse-leap-15.5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |