Bug ID 1224781
Summary VUL-0: CVE-2024-35192: trivy: credential leak via malicious registry
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/406773/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee dmueller@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC carlos.lopez@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to
trigger Trivy to scan container images from a crafted malicious registry, it
could result in the leakage of credentials for legitimate registries such as
AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry,
or Azure Container Registry (ACR). These tokens can then be used to push/pull
images from those registries to which the identity/user running Trivy has
access. Systems are not affected if the default credential provider chain is
unable to obtain valid credentials. This vulnerability only applies when
scanning container images directly from a registry. This vulnerability is fixed
in 0.51.2.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-35192
https://www.cve.org/CVERecord?id=CVE-2024-35192
https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87
https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj


You are receiving this mail because: