Sigstore Timestamp Authority allocates excessive memory during request parsing
High severity
GitHub Reviewed
Published
Dec 4, 2025
in
sigstore/timestamp-authority
•
Updated Dec 5, 2025
Package
Affected versions
<= 2.0.2
Patched versions
2.0.3
Description
Published by the National Vulnerability Database
Dec 4, 2025
Published to the GitHub Advisory Database
Dec 5, 2025
Reviewed
Dec 5, 2025
Last updated
Dec 5, 2025
Impact
Excessive memory allocation
Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the
Content-Typeheader (which is also untrusted data) on anapplicationstring.As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed
Content-Typeheader, a call toapi.ParseJSONRequestorapi.getContentTypeincurs allocations of O(n) bytes (where n stands for the length of the function's argument). Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)Patches
Upgrade to v2.0.3.
Workarounds
There are no workarounds with the service itself. If the service is behind a load balancer, configure the load balancer to reject excessively large requests.
References