Skip to content

Update module github.com/sigstore/sigstore to v1.10.4 [SECURITY] (main)#3087

Merged
renovate[bot] merged 1 commit intomainfrom
renovate/main-go-github.com-sigstore-sigstore-vulnerability
Feb 13, 2026
Merged

Update module github.com/sigstore/sigstore to v1.10.4 [SECURITY] (main)#3087
renovate[bot] merged 1 commit intomainfrom
renovate/main-go-github.com-sigstore-sigstore-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 24, 2026

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/sigstore/sigstore v1.10.3v1.10.4 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2026-24137

Summary

The legacy TUF client pkg/tuf/client.go, which supports caching target files to disk, constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata, but it does not validate that the resulting path stays within the cache base directory.

Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. As this TUF client implementation is deprecated, users should migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf as soon as possible.

Note that this does not affect users of the public Sigstore deployment, where TUF metadata is validated by a quorum of trusted collaborators.

Impact

A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has.

Workarounds

Users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.


Release Notes

sigstore/sigstore (github.com/sigstore/sigstore)

v1.10.4

Compare Source

What's Changed

Full Changelog: sigstore/sigstore@v1.10.3...v1.10.4


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/main-go-github.com-sigstore-sigstore-vulnerability branch from 33f05fe to c2e44e6 Compare February 2, 2026 21:16
@renovate renovate bot force-pushed the renovate/main-go-github.com-sigstore-sigstore-vulnerability branch from c2e44e6 to e31bc0c Compare February 10, 2026 11:31
@github-actions github-actions bot added size: L and removed size: XL labels Feb 10, 2026
@renovate renovate bot force-pushed the renovate/main-go-github.com-sigstore-sigstore-vulnerability branch 3 times, most recently from 155a574 to b14bac7 Compare February 13, 2026 19:00
@renovate renovate bot force-pushed the renovate/main-go-github.com-sigstore-sigstore-vulnerability branch from b14bac7 to 3d483de Compare February 13, 2026 20:39
@renovate renovate bot enabled auto-merge February 13, 2026 20:39
@github-actions github-actions bot added size: XS and removed size: L labels Feb 13, 2026
@renovate renovate bot merged commit 4719e7c into main Feb 13, 2026
10 checks passed
@renovate renovate bot deleted the renovate/main-go-github.com-sigstore-sigstore-vulnerability branch February 13, 2026 20:57
@codecov
Copy link

codecov bot commented Feb 13, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.

Flag Coverage Δ
acceptance 55.51% <ø> (+<0.01%) ⬆️
generative 18.56% <ø> (ø)
integration 27.56% <ø> (ø)
unit 68.39% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants