Your message dated Wed, 04 Feb 2026 23:05:23 +0000
with message-id <[email protected]>
and subject line Bug#1126275: fixed in rekor 1.5.0-1
has caused the Debian Bug report #1126275,
regarding rekor: CVE-2026-23831
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1126275: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126275
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: rekor
Version: 1.4.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerability was published for rekor.
CVE-2026-23831[0]:
| Rekor is a software supply chain transparency log. In versions 1.4.3
| and below, the entry implementation can panic on attacker-controlled
| input when canonicalizing a proposed entry with an empty
| spec.message, causing nil Pointer Dereference. Function validate()
| returns nil (success) when message is empty, leaving sign1Msg
| uninitialized, and Canonicalize() later dereferences
| v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1
| type can cause a panic on a thread within the Rekor process. The
| thread is recovered so the client receives a 500 error message and
| service still continues, so the availability impact of this is
| minimal. This issue has been fixed in version 1.5.0.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-23831
https://www.cve.org/CVERecord?id=CVE-2026-23831
[1] https://github.com/sigstore/rekor/security/advisories/GHSA-273p-m2cw-6833
[2]
https://github.com/sigstore/rekor/commit/39bae3d192bce48ef4ef2cbd1788fb5770fee8cd
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: rekor
Source-Version: 1.5.0-1
Done: Simon Josefsson <[email protected]>
We believe that the bug you reported is fixed in the latest version of
rekor, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Simon Josefsson <[email protected]> (supplier of updated rekor package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 04 Feb 2026 23:10:05 +0100
Source: rekor
Architecture: source
Version: 1.5.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team <[email protected]>
Changed-By: Simon Josefsson <[email protected]>
Closes: 1126275 1126276
Changes:
rekor (1.5.0-1) unstable; urgency=medium
.
* New upstream version
- Fix CVE-2026-23831 (Closes: #1126275)
- Fix CVE-2026-24117 (Closes: #1126276)
* Drop Priority: optional
* Standards-Version: 4.7.3
* Bump debian/* copyright years
Checksums-Sha1:
eee118a53ef3ddea7400c00e734c1b9c03c172dc 3581 rekor_1.5.0-1.dsc
75e578a3d4925f84bf00eb5c0b2f935773d1c7f4 565992 rekor_1.5.0.orig.tar.xz
7dc065b0f05614db711fff741f32ce6b28359d3c 5132 rekor_1.5.0-1.debian.tar.xz
6fe884de6cc515c82b70ce2101058242dce15862 1315048 rekor_1.5.0-1.git.tar.xz
321c27136236c2c6af6cd6444bdfedd43953abae 17286 rekor_1.5.0-1_source.buildinfo
Checksums-Sha256:
abf89dc5d317ef09fc04035b2cd6599225a45b0f3f29ff2a3bd3f82bdd839770 3581
rekor_1.5.0-1.dsc
112995dcadb270904ff80ba3cbea462951296cc00238c3d5376221c7268255de 565992
rekor_1.5.0.orig.tar.xz
28033150cee4b1fcd8063439498092491c2cb39b951988ad8077b9f73d93652e 5132
rekor_1.5.0-1.debian.tar.xz
b43109769a3e078491eb436a4534e1231c91e9f305d20bf3d01317ab9889a251 1315048
rekor_1.5.0-1.git.tar.xz
4b3ab798392c883b58bf32a00dc71beaccb00fb9736f26f0c1ad8625350885aa 17286
rekor_1.5.0-1_source.buildinfo
Files:
42ed6858e3da2997724eb1cd787da5cd 3581 golang optional rekor_1.5.0-1.dsc
44149b2b2b1fb766247b31dd0cfe1c5c 565992 golang optional rekor_1.5.0.orig.tar.xz
150753a4de159c08752c79369f6ce515 5132 golang optional
rekor_1.5.0-1.debian.tar.xz
2c0b6671085a5da60b1a7578a57725c3 1315048 golang None rekor_1.5.0-1.git.tar.xz
736852a627a1e745950b309d60b5691e 17286 golang optional
rekor_1.5.0-1_source.buildinfo
Git-Tag-Info: tag=1133d0464d3fcdeb9d376cc5dc4050cd05217d3b
fp=a3cc9c870b9d310abad4cf2f51722b08fe4745a2
Git-Tag-Tagger: Simon Josefsson <[email protected]>
-----BEGIN PGP SIGNATURE-----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=EAJU
-----END PGP SIGNATURE-----
pgpVeNdZ_sYVC.pgp
Description: PGP signature
--- End Message ---