Bug 2441194 (CVE-2026-24122)
| Summary: | CVE-2026-24122 sigstore/cosign: sigstore/cosign: Incorrect signature validation due to expired issuing certificate bypass | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | agarcial, akoudelk, alcohan, anthomas, aoconnor, aprice, asegurap, caswilli, dhanak, drosa, dsimansk, ehelms, ggainey, gparvin, jbalunas, jburrell, jdobes, jkoehler, jsamir, juwatts, kaycoth, kingland, kverlaen, lball, lbragsta, lphiri, mhulan, mnovotny, mstipich, ngough, nmoumoul, oezr, orabin, osousa, pahickey, pcreech, rchan, rexwhite, rhaigner, sausingh, smallamp, sthirugn, tmalecek, veshanka, wenshen, xiyuan |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in sigstore/cosign. This vulnerability affects private deployments using customized Public Key Infrastructures (PKIs), where it can lead to incorrect validation of artifact signatures. Cosign may mistakenly accept an issuing certificate as valid even if its expiration date precedes the leaf certificate's, potentially allowing invalid signatures to be trusted. This could compromise the integrity of signature verification in affected environments.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2026-02-19 23:02:10 UTC
|