You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The legacy TUF client pkg/tuf/client.go, which supports caching target files to disk, constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata, but it does not validate that the resulting path stays within the cache base directory.
Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. As this TUF client implementation is deprecated, users should migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf as soon as possible.
Note that this does not affect users of the public Sigstore deployment, where TUF metadata is validated by a quorum of trusted collaborators.
Impact
A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has.
Workarounds
Users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.
The action failed because make test failed (Makefile:104) when two Go unit tests in internal/downloader errored out: - TestOCITracing failed at /home/runner/work/cli/cli/internal/downloader/downloader_test.go:188 with unknown or unsupported trace version go 1.25. - TestHTTPTracing failed at /home/runner/work/cli/cli/internal/downloader/downloader_test.go:238 with unknown or unsupported trace version go 1.25.
This indicates the tests attempted to read/parse a trace file produced with Go 1.25, but the trace parser/library used by the code under test does not support that trace version, causing go test to exit non-zero and the GitHub Action to fail.
Relevant error logs:
1: ##[group]Runner Image Provisioner2: Hosted Compute Agent
...
707: go: downloading github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.0.0-20240826150212-5dc58b6e29f8708: go: downloading github.com/chrismellard/docker-credential-acr-env v0.0.0-20230304212654-82a0ddb27589709: go: downloading github.com/mozillazg/docker-credential-acr-helper v0.4.0710: go: downloading sigs.k8s.io/release-utils v0.8.4711: go: downloading go.yaml.in/yaml/v2 v2.4.2712: go: downloading github.com/logrusorgru/aurora v2.0.3+incompatible713: go: downloading github.com/olekukonko/tablewriter v0.0.5714: go: downloading github.com/owenrumney/go-sarif/v2 v2.3.3715: go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20231217050601-ba74d44ecf5f716: go: downloading github.com/go-openapi/runtime v0.28.0717: go: downloading github.com/digitorus/timestamp v0.0.0-20231217203849-220c5c2851b7718: go: downloading github.com/go-openapi/strfmt v0.23.0719: go: downloading github.com/go-openapi/swag v0.23.1720: go: downloading github.com/google/certificate-transparency-go v1.3.2-0.20250507091337-0eddb39e94f8721: go: downloading github.com/nozzle/throttler v0.0.0-20180817012639-2ea982251481722: go: downloading github.com/pkg/errors v0.9.1723: go: downloading github.com/sigstore/timestamp-authority v1.2.2
...
743: go: downloading github.com/google/cel-go v0.26.0744: go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b745: go: downloading knative.dev/pkg v0.0.0-20240815051656-89743d9bbf7c746: go: downloading github.com/sigstore/fulcio v1.6.3747: go: downloading go.step.sm/crypto v0.60.0748: go: downloading github.com/chainguard-dev/git-urls v1.0.2749: go: downloading github.com/sigstore/protobuf-specs v0.5.0750: go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822751: go: downloading golang.org/x/net v0.46.0752: go: downloading github.com/theupdateframework/go-tuf v0.7.0753: go: downloading github.com/ProtonMail/go-crypto v1.1.5754: go: downloading github.com/go-git/go-billy/v5 v5.6.2755: go: downloading github.com/emirpasic/gods v1.18.1756: go: downloading github.com/hashicorp/go-cleanhttp v0.5.2757: go: downloading github.com/hashicorp/go-retryablehttp v0.7.7758: go: downloading github.com/go-openapi/errors v0.22.1759: go: downloading github.com/go-openapi/validate v0.24.0
...
948: go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.49.0949: go: downloading github.com/googleapis/gax-go/v2 v2.14.1950: go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.36.0951: go: downloading go.opentelemetry.io/otel/sdk/metric v1.38.0952: go: downloading go.uber.org/multierr v1.11.0953: go: downloading github.com/sassoftware/relic v7.2.1+incompatible954: go: downloading github.com/go-logr/stdr v1.2.2955: go: downloading go.opentelemetry.io/auto/sdk v1.1.0956: go: downloading github.com/moby/locker v1.0.1957: go: downloading github.com/dgraph-io/ristretto/v2 v2.2.0958: go: downloading github.com/census-instrumentation/opencensus-proto v0.4.1959: go: downloading github.com/golang/protobuf v1.5.4960: go: downloading github.com/prometheus/statsd_exporter v0.27.1961: go: downloading github.com/blendle/zapdriver v1.3.1962: go: downloading github.com/golang/snappy v0.0.4963: go: downloading github.com/hashicorp/go-multierror v1.1.1964: go: downloading cloud.google.com/go/auth v0.15.0
...
985: go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0986: go: downloading github.com/go-logfmt/logfmt v0.6.0987: go: downloading github.com/spiffe/go-spiffe/v2 v2.5.0988: go: downloading github.com/cncf/xds/go v0.0.0-20250501225837-2ac532fd4443989: go: downloading github.com/zeebo/errs v1.4.0990: go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1991: ##[group]Run git diff --stat --patch992: �[36;1mgit diff --stat --patch�[0m993: shell: /usr/bin/bash -e {0}994: env:995: GOTOOLCHAIN: local996: ##[endgroup]997: ##[group]Run if ! git diff --exit-code -s; then998: �[36;1mif ! git diff --exit-code -s; then�[0m999: �[36;1m for f in $(git diff --exit-code --name-only); do�[0m1000: �[36;1m echo "::error file=$f,line=1,col=1,endColumn=1::File was modified in build"�[0m1001: �[36;1m done�[0m
...
1040: 2026/02/02 13:08:48 HEAD /v2/repository/image/blobs/sha256:54271efe67f34f4ff120ae084fb91530126a8feb5973bec1bfefc7f11bf066e7 404 BLOB_UNKNOWN Unknown blob1041: 2026/02/02 13:08:48 POST /v2/repository/image/blobs/uploads/1042: 2026/02/02 13:08:48 POST /v2/repository/image/blobs/uploads/1043: 2026/02/02 13:08:48 POST /v2/repository/image/blobs/uploads/1044: 2026/02/02 13:08:48 PATCH /v2/repository/image/blobs/uploads/36800934643417051451045: 2026/02/02 13:08:48 PATCH /v2/repository/image/blobs/uploads/59330592410174822351046: 2026/02/02 13:08:48 PATCH /v2/repository/image/blobs/uploads/49350949232735762441047: 2026/02/02 13:08:48 PUT /v2/repository/image/blobs/uploads/3680093464341705145?digest=sha256%3A62470c62182abb05c5b3292ebf9acacab7b239bf43aa37c6ed8461732f20f58e1048: 2026/02/02 13:08:48 PUT /v2/repository/image/blobs/uploads/4935094923273576244?digest=sha256%3A54271efe67f34f4ff120ae084fb91530126a8feb5973bec1bfefc7f11bf066e71049: 2026/02/02 13:08:48 PUT /v2/repository/image/blobs/uploads/5933059241017482235?digest=sha256%3A59a03353b9249a777179947faa21d38f9123f2777d27a6c04912e9ff48db2f631050: 2026/02/02 13:08:48 PUT /v2/repository/image/manifests/tag1051: 2026/02/02 13:08:48 GET /v2/repository/image/manifests/tag1052: 2026/02/02 13:08:48 GET /v2/repository/image/blobs/sha256:62470c62182abb05c5b3292ebf9acacab7b239bf43aa37c6ed8461732f20f58e1053: 2026/02/02 13:08:48 GET /v2/repository/image/blobs/sha256:54271efe67f34f4ff120ae084fb91530126a8feb5973bec1bfefc7f11bf066e71054: 2026/02/02 13:08:48 GET /v2/repository/image/blobs/sha256:59a03353b9249a777179947faa21d38f9123f2777d27a6c04912e9ff48db2f631055: --- FAIL: TestOCITracing (0.04s)1056: downloader_test.go:188: 1057: Error Trace: /home/runner/work/cli/cli/internal/downloader/downloader_test.go:1881058: Error: Received unexpected error:1059: unknown or unsupported trace version go 1.251060: Test: TestOCITracing1061: --- FAIL: TestHTTPTracing (0.00s)1062: downloader_test.go:238: 1063: Error Trace: /home/runner/work/cli/cli/internal/downloader/downloader_test.go:2381064: Error: Received unexpected error:1065: unknown or unsupported trace version go 1.25
...
1081: ok github.com/conforma/cli/internal/opa/rule 1.056s coverage: 90.1% of statements1082: ok github.com/conforma/cli/internal/output 1.141s coverage: 87.9% of statements1083: ok github.com/conforma/cli/internal/policy 1.927s coverage: 87.2% of statements1084: ok github.com/conforma/cli/internal/policy/source 1.039s coverage: 77.4% of statements1085: ok github.com/conforma/cli/internal/rego/oci 1.105s coverage: 96.0% of statements1086: ok github.com/conforma/cli/internal/rego/sigstore 1.169s coverage: 88.8% of statements1087: ok github.com/conforma/cli/internal/signature 1.056s coverage: 65.9% of statements1088: ok github.com/conforma/cli/internal/tracing 1.025s coverage: 97.6% of statements1089: ok github.com/conforma/cli/internal/tracker 1.300s coverage: 69.3% of statements1090: ok github.com/conforma/cli/internal/utils 1.039s coverage: 78.1% of statements1091: ok github.com/conforma/cli/internal/utils/oci 1.201s coverage: 17.9% of statements1092: ok github.com/conforma/cli/internal/validate 1.019s coverage: 56.0% of statements1093: ok github.com/conforma/cli/internal/validate/vsa 1.152s coverage: 69.6% of statements1094: ok github.com/conforma/cli/internal/version 1.015s coverage: 94.3% of statements1095: FAIL1096: make: *** [Makefile:104: test] Error 11097: ##[error]Process completed with exit code 2.1098: Post job cleanup.
renovatebot
changed the title
Update module github.com/sigstore/sigstore to v1.10.4 [SECURITY] (release-v0.7)
Update module github.com/sigstore/sigstore to v1.10.4 [SECURITY] (release-v0.7) - autoclosed
Feb 14, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.9.1→v1.10.4GitHub Vulnerability Alerts
CVE-2026-24137
Summary
The legacy TUF client
pkg/tuf/client.go, which supports caching target files to disk, constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata, but it does not validate that the resulting path stays within the cache base directory.Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. As this TUF client implementation is deprecated, users should migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf as soon as possible.
Note that this does not affect users of the public Sigstore deployment, where TUF metadata is validated by a quorum of trusted collaborators.
Impact
A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has.
Workarounds
Users can disable disk caching for the legacy client by setting
SIGSTORE_NO_CACHE=truein the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.Release Notes
sigstore/sigstore (github.com/sigstore/sigstore)
v1.10.4Compare Source
What's Changed
Full Changelog: sigstore/sigstore@v1.10.3...v1.10.4
v1.10.3Compare Source
What's Changed
v1.10.3 adds
ValidatePubKeyback to thecryptoutilspackage to avoid a breaking API change.Full Changelog: sigstore/sigstore@v1.10.2...v1.10.3
v1.10.2v1.10.2
Functionally equivalent to v1.10.0. v1.10.1 has been retracted to remove copied code.
v1.10.0
Breaking change
#2194 moves
cryptoutils.ValidatePubKeytogoodkey.ValidatePubKeyto minimize the dependency tree for clients using the cryptoutils package.Features
Refactoring
v1.10.0Compare Source
Breaking change
#2194 moves
cryptoutils.ValidatePubKeytogoodkey.ValidatePubKeyto minimize the dependency tree for clients using thecryptoutilspackage.Features
Refactoring
Full Changelog: sigstore/sigstore@v1.9.5...v1.10.0
v1.9.5Compare Source
What's Changed
Full Changelog: sigstore/sigstore@v1.9.4...v1.9.5
v1.9.4Compare Source
What's Changed
Full Changelog: sigstore/sigstore@v1.9.3...v1.9.4
v1.9.3Compare Source
What's Changed
New Contributors
Full Changelog: sigstore/sigstore@v1.9.2...v1.9.3
v1.9.2Compare Source
What's Changed
New Contributors
Full Changelog: sigstore/sigstore@v1.9.1...v1.9.2
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.