CVE-2026-35172Improper Access Control in Distribution

Severity
7.5HIGHNVD
EPSS
0.0%
top 87.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 6
Latest updateApr 13

Description

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are both enabled. The delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later Stat or Get from repo b repopulates the shared descriptor and makes the deleted blob readable from repo a again. This vulnerabilit

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

5
VulDB
Distribution up to 3.0.x access control (Nessus ID 305620)2026-04-13
OSV
CVE-2026-35172: Distribution is a toolkit to pack, ship, store, and deliver container content2026-04-07
OSV
Distribution: stale blob access resurrection via repo-scoped redis descriptor cache invalidation2026-04-06
CVEList
Distribution has stale blob access resurrection via repo-scoped redis descriptor cache invalidation2026-04-06
GHSA
Distribution: stale blob access resurrection via repo-scoped redis descriptor cache invalidation2026-04-06

📋Vendor Advisories

1
Red Hat
github.com/distribution/distribution: Distribution: Information disclosure via stale references after content deletion2026-04-06

🕵️Threat Intelligence

1
Wiz
CVE-2026-35172 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-35172 github.com/distribution/distribution: Distribution: Information disclosure via stale references after content deletion2026-04-06
CVE-2026-35172 — Improper Access Control | cvebase