Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mhg6-2q2v-9h2c | sigstore-ruby verifier returns success for DSSE bundles with mismatched in-toto subject digest |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sigstore
Sigstore sigstore-ruby |
|
| Vendors & Products |
Sigstore
Sigstore sigstore-ruby |
Tue, 10 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sigstore-ruby is a pure Ruby implementation of the sigstore verify command from the sigstore/cosign project. Prior to 0.2.3, Sigstore::Verifier#verify does not propagate the VerificationFailure returned by verify_in_toto when the artifact digest does not match the digest in the in-toto attestation subject. As a result, verification of DSSE bundles containing in-toto statements returns VerificationSuccess regardless of whether the artifact matches the attested subject. This vulnerability is fixed in 0.2.3. | |
| Title | sigstore-ruby verifier returns success for DSSE bundles with mismatched in-toto subject digest | |
| Weaknesses | CWE-252 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-11T15:59:03.786Z
Reserved: 2026-03-09T17:41:56.077Z
Link: CVE-2026-31830
Updated: 2026-03-11T15:53:29.010Z
Status : Awaiting Analysis
Published: 2026-03-10T22:16:21.097
Modified: 2026-03-11T13:52:47.683
Link: CVE-2026-31830
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:42:00Z
Github GHSA