This update for cosign fixes the following issues:
Update to version 3.0.5:
CVE-2026-24122: Fixed improper validation of certificates that outlive
expired CA certificates (bsc#1258542)
CVE-2026-26958: Fixed filippo.io/edwards25519: failure to initialize receiver
in MultiScalarMult can produce invalid results and lead to undefined behavior
(bsc#1258612)
CVE-2026-24137: Fixed github.com/sigstore/sigstore/pkg/tuf: legacy TUF client
allows for arbitrary file writes with target cache path traversal
(bsc#1257139)
CVE-2026-22772: Fixed github.com/sigstore/fulcio: bypass MetaIssuer URL
validation bypass can trigger SSRF to arbitrary internal services
(bsc#1256562)
CVE-2026-23991: Fixed github.com/theupdateframework/go-tuf/v2: denial of
service due to invalid TUF metadata JSON returned by TUF repository
(bsc#1257080)
CVE-2026-23992: Fixed github.com/theupdateframework/go-tuf/v2: unauthorized
modification to TUF metadata files due to a compromised or misconfigured TUF
repository (bsc#1257085)
CVE-2025-11065: Fixed github.com/go-viper/mapstructure/v2: sensitive
Information leak in logs (bsc#1250620)
CVE-2026-22703: Fixed that cosign verification accepts any valid Rekor entry
under certain conditions (bsc#1256496)
CVE-2025-58181: Fixed golang.org/x/crypto/ssh: invalidated number of
mechanisms can cause unbounded memory consumption (bsc#1253913)