CVE-2026-23831
MEDIUM SEVERITYCVSS Score & Metrics
Base Score
5.3 / 10
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vulnerability Description
Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
Vulnerability Details
Published Date
Last Modified
CWE ID
CWE-476
Source
GitHub
Vendor
go
Product
github.com/sigstore/rekor
External References
- https://github.com/sigstore/rekor/security/advisories/GHSA-273p-m2cw-6833
- https://github.com/sigstore/rekor/commit/39bae3d192bce48ef4ef2cbd1788fb5770fee8cd
- https://github.com/sigstore/rekor/releases/tag/v1.5.0
- https://nvd.nist.gov/vuln/detail/CVE-2026-23831
- https://github.com/advisories/GHSA-273p-m2cw-6833
Discussion (0)
Add Comment
No comments yet. Be the first!