Skip to content

Commit fc0c6a6

Browse files
1 parent 6538b28 commit fc0c6a6

2 files changed

Lines changed: 100 additions & 5 deletions

File tree

advisories/unreviewed/2026/01/GHSA-38vq-g6vr-w8wf/GHSA-38vq-g6vr-w8wf.json renamed to advisories/github-reviewed/2026/01/GHSA-38vq-g6vr-w8wf/GHSA-38vq-g6vr-w8wf.json

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-38vq-g6vr-w8wf",
4-
"modified": "2026-01-22T18:30:39Z",
4+
"modified": "2026-01-22T20:28:39Z",
55
"published": "2026-01-22T18:30:39Z",
66
"aliases": [
77
"CVE-2026-1260"
88
],
9+
"summary": "Sentencepiece has a a heap overflow issue",
910
"details": "Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file, which is not created in the normal training procedure.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "sentencepiece"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.2.1"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1260"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/google/sentencepiece/commit/d856b67fdb3492e035489abf9b3aaf486144b2c0"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/google/sentencepiece"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://github.com/google/sentencepiece/releases/tag/v0.2.1"
@@ -29,8 +58,8 @@
2958
"CWE-119"
3059
],
3160
"severity": "HIGH",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-01-22T20:28:39Z",
3463
"nvd_published_at": "2026-01-22T17:16:30Z"
3564
}
3665
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fcv2-xgw5-pqxf",
4+
"modified": "2026-01-22T20:28:56Z",
5+
"published": "2026-01-22T20:28:56Z",
6+
"aliases": [],
7+
"summary": "sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal",
8+
"details": "## Summary\n\nThe legacy TUF client `pkg/tuf/client.go`, which supports caching target files to disk, constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata, but it does not validate that the resulting path stays within the cache base directory.\n\nNote that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. As this TUF client implementation is deprecated, users should migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf as soon as possible.\n\nNote that this does not affect users of the public Sigstore deployment, where TUF metadata is validated by a quorum of trusted collaborators. \n\n## Impact\n\nA malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has.\n\n## Workarounds\n\nUsers can disable disk caching for the legacy client by setting `SIGSTORE_NO_CACHE=true` in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/sigstore/sigstore"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "1.10.4"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 1.10.3"
36+
}
37+
}
38+
],
39+
"references": [
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/sigstore/sigstore/security/advisories/GHSA-fcv2-xgw5-pqxf"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/sigstore/sigstore/commit/8ec410a2993ea78083aecf0e473a85453039496e"
47+
},
48+
{
49+
"type": "PACKAGE",
50+
"url": "https://github.com/sigstore/sigstore"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://github.com/sigstore/sigstore/releases/tag/v1.10.4"
55+
}
56+
],
57+
"database_specific": {
58+
"cwe_ids": [
59+
"CWE-22"
60+
],
61+
"severity": "MODERATE",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2026-01-22T20:28:56Z",
64+
"nvd_published_at": null
65+
}
66+
}

0 commit comments

Comments
 (0)