Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This has been fixed in v1.2.0 of Rekor. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Tue, 14 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-14T19:07:53.630Z

Reserved: 2023-05-17T22:25:50.700Z

Link: CVE-2023-33199

cve-icon Vulnrichment

Updated: 2024-08-02T15:39:35.807Z

cve-icon NVD

Status : Modified

Published: 2023-05-26T23:15:18.960

Modified: 2024-11-21T08:05:06.580

Link: CVE-2023-33199

cve-icon Redhat

No data.