Skip to content

Remove suspicion of extension bytes#1657

Merged
woodruffw merged 1 commit intosigstore:mainfrom
cmurphy:scts-exts
Jan 15, 2026
Merged

Remove suspicion of extension bytes#1657
woodruffw merged 1 commit intosigstore:mainfrom
cmurphy:scts-exts

Conversation

@cmurphy
Copy link
Contributor

@cmurphy cmurphy commented Jan 15, 2026

SCTs produced by a Static CT log have the extension field populated[1], do not reject it.

[1] https://github.com/C2SP/C2SP/blob/main/static-ct-api.md#sct-extension

Summary

Release Note

Documentation

SCTs produced by a Static CT log have the extension field populated[1],
do not reject it.

[1] https://github.com/C2SP/C2SP/blob/main/static-ct-api.md#sct-extension

Signed-off-by: Colleen Murphy <colleenmurphy@google.com>
@woodruffw
Copy link
Member

/gcbrun

Copy link
Member

@woodruffw woodruffw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @cmurphy!

@woodruffw woodruffw merged commit 0e2f09e into sigstore:main Jan 15, 2026
41 checks passed
@jku jku mentioned this pull request Jan 20, 2026
jku pushed a commit to jku/sigstore-python that referenced this pull request Jan 26, 2026
jku added a commit that referenced this pull request Jan 26, 2026
* Remove suspicion of extension bytes (#1657)

* Include SCT extension in signature data (#1659)

* Add state validation to OIDC flow to prevent CSRF

The OIDC flow in did not verify the `state` parameter returned by the
identity provider against the state sent in the request. This could
allow tricking the user into using an authorization code obtained by
the attacker.

All of the response parsing should arguably be moved to
_OAuthRedirectServer (to hide the details from `sigstore.oidc`) but
I wanted to keep this fix minimal.

Test generated by AI.

Signed-off-by: Jussi Kukkonen <jkukkonen@google.com>

* Update version to 3.6.7, update CHANGELOG

Signed-off-by: Jussi Kukkonen <jkukkonen@google.com>

---------

Signed-off-by: Jussi Kukkonen <jkukkonen@google.com>
Co-authored-by: Colleen Murphy <cmurphy@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants