Skip to content

chore(deps): update module github.com/sigstore/timestamp-authority to v2 [security]#240

Merged
jrahme-cci merged 4 commits intomainfrom
renovate/go-github.com-sigstore-timestamp-authority-vulnerability
Jan 8, 2026
Merged

chore(deps): update module github.com/sigstore/timestamp-authority to v2 [security]#240
jrahme-cci merged 4 commits intomainfrom
renovate/go-github.com-sigstore-timestamp-authority-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Dec 22, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/sigstore/timestamp-authority v1.2.8v2.0.3 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2025-66564

Impact

Excessive memory allocation

Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string.

As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Patches

Upgrade to v2.0.3.

Workarounds

There are no workarounds with the service itself. If the service is behind a load balancer, configure the load balancer to reject excessively large requests.


Sigstore Timestamp Authority allocates excessive memory during request parsing

CVE-2025-66564 / GHSA-4qg8-fj49-pxjh / GO-2025-4192

More information

Details

Impact

Excessive memory allocation

Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string.

As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Patches

Upgrade to v2.0.3.

Workarounds

There are no workarounds with the service itself. If the service is behind a load balancer, configure the load balancer to reject excessively large requests.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

sigstore/timestamp-authority (github.com/sigstore/timestamp-authority)

v2.0.3

Compare Source

Vulnerability Fixes

v2.0.2

Compare Source

This release bumps the Go version to 1.25.

v2.0.1

Compare Source

This release is identical to v2.0.0, as it only contains a fix for the release pipeline.

v2.0.0

Compare Source

v2.0.0 changes the default HTTP response code to 200 for timestamp responses,
which matches all other well-known TSA implementations. Sigstore clients already
handle both 200 and 201 response codes, so no changes are needed to clients.

If you need backwards compatibility, you can deploy the service with
--use-http-201.

This release also changes the format of the binary and container signature,
which is now a Sigstore bundle.
To verify a release, use the latest Cosign 3.x, verifying with
cosign verify-blob --bundle <artifact>-keyless.sigstore.json <artifact>.

Features

  • changes default HTTP response code to 200 for timestamp responses (#​1202)
  • feat: add configurable max request body size for TSA server (#​1176)

Testing

  • test: Add a K6 loadtest

Documentation

  • Minor improvements to documentation (#​1169)

Misc

  • (fix): minor gosec issues under x509.go (#​1201)

v1.2.9

Compare Source

  • logging: Don't use Error when logging 4xx responses (#​1159)
  • add feature to disable intermediate cert EKU enforcement (#​1146)
  • add documentation for AWS KMS example (#​1094)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner December 22, 2025 17:22
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Dec 22, 2025

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 18 additional dependencies were updated

Details:

Package Change
github.com/gabriel-vasile/mimetype v1.4.8 -> v1.4.10
github.com/go-openapi/analysis v0.23.0 -> v0.24.1
github.com/go-openapi/errors v0.22.1 -> v0.22.4
github.com/go-openapi/jsonpointer v0.21.1 -> v0.22.1
github.com/go-openapi/jsonreference v0.21.0 -> v0.21.3
github.com/go-openapi/loads v0.22.0 -> v0.23.2
github.com/go-openapi/runtime v0.28.0 -> v0.29.2
github.com/go-openapi/spec v0.21.0 -> v0.22.1
github.com/go-openapi/strfmt v0.23.0 -> v0.25.0
github.com/go-openapi/swag v0.23.1 -> v0.25.4
github.com/go-playground/validator/v10 v10.27.0 -> v10.28.0
github.com/sagikazarmark/locafero v0.9.0 -> v0.11.0
github.com/sourcegraph/conc v0.3.0 -> v0.3.1-0.20240121214520-5f936abd7ae8
github.com/spf13/afero v1.14.0 -> v1.15.0
github.com/spf13/cast v1.9.2 -> v1.10.0
github.com/spf13/viper v1.20.1 -> v1.21.0
go.mongodb.org/mongo-driver v1.17.3 -> v1.17.6
sigs.k8s.io/yaml v1.4.0 -> v1.6.0

@renovate renovate Bot force-pushed the renovate/go-github.com-sigstore-timestamp-authority-vulnerability branch from 7ae1202 to 9f776b0 Compare January 7, 2026 14:25
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Jan 7, 2026

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@jrahme-cci jrahme-cci force-pushed the renovate/go-github.com-sigstore-timestamp-authority-vulnerability branch 3 times, most recently from 1729c39 to 86179fe Compare January 8, 2026 16:04
@jrahme-cci jrahme-cci force-pushed the renovate/go-github.com-sigstore-timestamp-authority-vulnerability branch from 86179fe to 93ab3df Compare January 8, 2026 16:05
@jrahme-cci jrahme-cci merged commit 9c0dea1 into main Jan 8, 2026
9 checks passed
@jrahme-cci jrahme-cci deleted the renovate/go-github.com-sigstore-timestamp-authority-vulnerability branch January 8, 2026 16:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant