SUSE-SU-2026:20904-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620904-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20904-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:20904-1
Upstream
Related
Published
2026-03-18T11:27:44Z
Modified
2026-04-02T17:33:48.756256Z
Summary
Security update for cosign
Details

This update for cosign fixes the following issues:

Update to version 3.0.5:

  • CVE-2026-24122: Fixed improper validation of certificates that outlive expired CA certificates (bsc#1258542)
  • CVE-2026-26958: Fixed filippo.io/edwards25519: failure to initialize receiver in MultiScalarMult can produce invalid results and lead to undefined behavior (bsc#1258612)
  • CVE-2026-24137: Fixed github.com/sigstore/sigstore/pkg/tuf: legacy TUF client allows for arbitrary file writes with target cache path traversal (bsc#1257139)
  • CVE-2026-22772: Fixed github.com/sigstore/fulcio: bypass MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services (bsc#1256562)
  • CVE-2026-23991: Fixed github.com/theupdateframework/go-tuf/v2: denial of service due to invalid TUF metadata JSON returned by TUF repository (bsc#1257080)
  • CVE-2026-23992: Fixed github.com/theupdateframework/go-tuf/v2: unauthorized modification to TUF metadata files due to a compromised or misconfigured TUF repository (bsc#1257085)
  • CVE-2025-11065: Fixed github.com/go-viper/mapstructure/v2: sensitive Information leak in logs (bsc#1250620)
  • CVE-2026-22703: Fixed that cosign verification accepts any valid Rekor entry under certain conditions (bsc#1256496)
  • CVE-2025-58181: Fixed golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption (bsc#1253913)
References

Affected packages

SUSE:Linux Enterprise Server 16.0 / cosign

Package

Name
cosign
Purl
pkg:rpm/suse/cosign&distro=SUSE%20Linux%20Enterprise%20Server%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.5-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "cosign": "3.0.5-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20904-1.json"

SUSE:Linux Enterprise Server for SAP applications 16.0 / cosign

Package

Name
cosign
Purl
pkg:rpm/suse/cosign&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.5-160000.1.1

Ecosystem specific

{
    "binaries": [
        {
            "cosign": "3.0.5-160000.1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20904-1.json"