Bug 2432246 (CVE-2026-24137) - CVE-2026-24137 github.com/sigstore/sigstore: sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal
Summary: CVE-2026-24137 github.com/sigstore/sigstore: sigstore legacy TUF client allow...
Keywords:
Status: NEW
Alias: CVE-2026-24137
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2433572 2433576 2433577 2433578 2433579 2433584 2433586 2433592 2433593 2433599 2433601 2433565 2433566 2433567 2433568 2433569 2433570 2433571 2433573 2433574 2433575 2433580 2433581 2433582 2433583 2433585 2433587 2433588 2433589 2433590 2433591 2433594 2433595 2433596 2433597 2433598 2433600 2433602 2433603 2433604
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-23 01:01 UTC by OSIDB Bzimport
Modified: 2026-01-27 21:41 UTC (History)
77 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-23 01:01:20 UTC
sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.


Note You need to log in before you can comment on or make changes to this bug.