Allocation of Resources Without Limits or Throttling Affecting github.com/sigstore/cosign/v2/pkg/cosign package, versions <2.2.4


0.0
medium

Snyk CVSS

    Attack Complexity High
    Privileges Required High
    User Interaction Required
    Availability High

    Threat Intelligence

    EPSS 0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMSIGSTORECOSIGNV2PKGCOSIGN-6596514
  • published 11 Apr 2024
  • disclosed 10 Apr 2024
  • credit Unknown

How to fix?

Upgrade github.com/sigstore/cosign/v2/pkg/cosign to version 2.2.4 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the process of creating slices based on the number of signatures, manifests, or attestations in untrusted artifacts. An attacker can cause the application to allocate excessive memory by submitting a crafted artifact that specifies a large number of these elements, leading to a denial of service condition.

Note

This issue was fixed in 2.2.4.