Source: golang-github-sigstore-sigstore
Version: 1.10.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-github-sigstore-sigstore.

CVE-2026-24137[0]:
| sigstore framework is a common go library shared across sigstore
| services and clients. In versions 1.10.3 and below, the legacy TUF
| client (pkg/tuf/client.go) supports caching target files to disk. It
| constructs a filesystem path by joining a cache base directory with
| a target name sourced from signed target metadata; however, it does
| not validate that the resulting path stays within the cache base
| directory. A malicious TUF repository can trigger arbitrary file
| overwriting, limited to the permissions that the calling process
| has. Note that this should only affect clients that are directly
| using the TUF client in sigstore/sigstore or are using an older
| version of Cosign. Public Sigstore deployment users are unaffected,
| as TUF metadata is validated by a quorum of trusted collaborators.
| This issue has been fixed in version 1.10.4. As a workaround, users
| can disable disk caching for the legacy client by setting
| SIGSTORE_NO_CACHE=true in the environment, migrate to
| https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or
| upgrade to the latest sigstore/sigstore release.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-24137
    https://www.cve.org/CVERecord?id=CVE-2026-24137
[1] https://github.com/sigstore/sigstore/security/advisories/GHSA-fcv2-xgw5-pqxf
[2] 
https://github.com/sigstore/sigstore/commit/8ec410a2993ea78083aecf0e473a85453039496e

Please adjust the affected versions in the BTS as needed.

Regards
Salvatore

Reply via email to