CVE-2023-30551

Name
CVE-2023-30551
Description
Rekor is an open source software supply chain transparency log. Rekor prior to version 1.1.1 may crash due to out of memory (OOM) conditions caused by reading archive metadata files into memory without checking their sizes first. Verification of a JAR file submitted to Rekor can cause an out of memory crash if files within the META-INF directory of the JAR are sufficiently large. Parsing of an APK file submitted to Rekor can cause an out of memory crash if the .SIGN or .PKGINFO files within the APK are sufficiently large. The OOM crash has been patched in Rekor version 1.1.1. There are no known workarounds.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/sigstore/rekor/releases/tag/v1.1.1
MISC https://github.com/sigstore/rekor/commit/cf42ace82667025fe128f7a50cf6b4cdff51cc48
MISC https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:linuxfoundation:rekor:*:*:*:*:*:*:*:* rekor >= None < 1.1.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
rekor 3.17-community 0.12.0-r7 kpcyrd <git@rxv.cc> possibly vulnerable