Advisories for Golang/Github.com/Sigstore/Sigstore-Go package

2024

sigstore-go has an unbounded loop over untrusted input can lead to endless data attack

sigstore-go is susceptible to a denial of service attack when a verifier is provided a maliciously crafted Sigstore Bundle containing large amounts of verifiable data, in the form of signed transparency log entries, RFC 3161 timestamps, and attestation subjects. The verification of these data structures is computationally expensive. This can be used to consume excessive CPU resources, leading to a denial of service attack. TUF's security model labels this type …