Security update for cosign
| Announcement ID: | SUSE-SU-2026:20904-1 |
|---|---|
| Release Date: | 2026-03-18T11:29:30Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for cosign fixes the following issues:
Update to version 3.0.5:
- CVE-2026-24122: Fixed improper validation of certificates that outlive expired CA certificates (bsc#1258542)
- CVE-2026-26958: Fixed filippo.io/edwards25519: failure to initialize receiver in MultiScalarMult can produce invalid results and lead to undefined behavior (bsc#1258612)
- CVE-2026-24137: Fixed github.com/sigstore/sigstore/pkg/tuf: legacy TUF client allows for arbitrary file writes with target cache path traversal (bsc#1257139)
- CVE-2026-22772: Fixed github.com/sigstore/fulcio: bypass MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services (bsc#1256562)
- CVE-2026-23991: Fixed github.com/theupdateframework/go-tuf/v2: denial of service due to invalid TUF metadata JSON returned by TUF repository (bsc#1257080)
- CVE-2026-23992: Fixed github.com/theupdateframework/go-tuf/v2: unauthorized modification to TUF metadata files due to a compromised or misconfigured TUF repository (bsc#1257085)
- CVE-2025-11065: Fixed github.com/go-viper/mapstructure/v2: sensitive Information leak in logs (bsc#1250620)
- CVE-2026-22703: Fixed that cosign verification accepts any valid Rekor entry under certain conditions (bsc#1256496)
- CVE-2025-58181: Fixed golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption (bsc#1253913)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server - BCI 16.0
zypper in -t patch SUSE-SLES-16.0-404=1
Package List:
-
SUSE Linux Enterprise Server - BCI 16.0 (aarch64 ppc64le s390x x86_64)
- cosign-debuginfo-3.0.5-160000.1.1
- cosign-3.0.5-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2025-11065.html
- https://www.suse.com/security/cve/CVE-2025-58181.html
- https://www.suse.com/security/cve/CVE-2026-22703.html
- https://www.suse.com/security/cve/CVE-2026-22772.html
- https://www.suse.com/security/cve/CVE-2026-23991.html
- https://www.suse.com/security/cve/CVE-2026-23992.html
- https://www.suse.com/security/cve/CVE-2026-24122.html
- https://www.suse.com/security/cve/CVE-2026-24137.html
- https://www.suse.com/security/cve/CVE-2026-26958.html
- https://bugzilla.suse.com/show_bug.cgi?id=1250620
- https://bugzilla.suse.com/show_bug.cgi?id=1253913
- https://bugzilla.suse.com/show_bug.cgi?id=1256496
- https://bugzilla.suse.com/show_bug.cgi?id=1256562
- https://bugzilla.suse.com/show_bug.cgi?id=1257080
- https://bugzilla.suse.com/show_bug.cgi?id=1257085
- https://bugzilla.suse.com/show_bug.cgi?id=1257139
- https://bugzilla.suse.com/show_bug.cgi?id=1258542
- https://bugzilla.suse.com/show_bug.cgi?id=1258612