Source: rekor
Version: 1.4.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for rekor.

CVE-2026-23831[0]:
| Rekor is a software supply chain transparency log. In versions 1.4.3
| and below, the entry implementation can panic on attacker-controlled
| input when canonicalizing a proposed entry with an empty
| spec.message, causing nil Pointer Dereference. Function validate()
| returns nil (success) when message is empty, leaving sign1Msg
| uninitialized, and Canonicalize() later dereferences
| v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1
| type can cause a panic on a thread within the Rekor process. The
| thread is recovered so the client receives a 500 error message and
| service still continues, so the availability impact of this is
| minimal. This issue has been fixed in version 1.5.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-23831
    https://www.cve.org/CVERecord?id=CVE-2026-23831
[1] https://github.com/sigstore/rekor/security/advisories/GHSA-273p-m2cw-6833
[2] 
https://github.com/sigstore/rekor/commit/39bae3d192bce48ef4ef2cbd1788fb5770fee8cd

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to