Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
References
Configurations
History
17 Mar 2026, 20:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:linuxfoundation:sigstore_timestamp_authority:*:*:*:*:*:*:*:* | |
| First Time |
Linuxfoundation
Linuxfoundation sigstore Timestamp Authority |
|
| References | () https://github.com/sigstore/timestamp-authority/commit/0cae34e197d685a14904e0bad135b89d13b69421 - Patch | |
| References | () https://github.com/sigstore/timestamp-authority/security/advisories/GHSA-4qg8-fj49-pxjh - Vendor Advisory |
04 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 23:15
Updated : 2026-03-17 20:38
NVD link : CVE-2025-66564
Mitre link : CVE-2025-66564
CVE.ORG link : CVE-2025-66564
JSON object : View
Products Affected
linuxfoundation
- sigstore_timestamp_authority
CWE
CWE-405
Asymmetric Resource Consumption (Amplification)
