Bug 2433569 - CVE-2026-24137 singularity-ce: sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal [epel-8]
Summary: CVE-2026-24137 singularity-ce: sigstore legacy TUF client allows for arbitrar...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: singularity-ce
Version: epel8
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: David Trudgian
QA Contact:
URL:
Whiteboard: {"flaws": ["a44ea10f-af2b-4305-85db-2...
Depends On:
Blocks: CVE-2026-24137
TreeView+ depends on / blocked
 
Reported: 2026-01-27 21:37 UTC by Jon Moroney
Modified: 2026-02-09 12:03 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-02-09 12:03:56 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jon Moroney 2026-01-27 21:37:35 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 David Trudgian 2026-02-09 12:03:56 UTC
SingularityCE does not use the legacy TUF client directly. In addition, it does not use cosign routines which call the legacy TUF client for verification - it calls into sigstore verification routines directly, verifying against simple keys only. There is no TUF root support.


Note You need to log in before you can comment on or make changes to this bug.