Debian Package Tracker
Register | Log in
Subscribe

rekor

Software Supply Chain Transparency Log (program)

Choose email to subscribe with

general
  • source: rekor (main)
  • version: 1.5.0-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Reinhard Tartler [DMD] – Simon Josefsson [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 1.3.9-1
  • testing: 1.5.0-1
  • unstable: 1.5.0-1
versioned links
  • 1.3.9-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-sigstore-rekor-dev
  • rekor
action needed
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-23831: (needs triaging) Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
  • CVE-2026-24117: (needs triaging) Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-23 Last update: 2026-02-12 05:30
news
[rss feed]
  • [2026-02-12] rekor 1.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-04] Accepted rekor 1.5.0-1 (source) into unstable (Simon Josefsson)
  • [2025-12-18] rekor 1.4.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-08] Accepted rekor 1.4.3-1 (source) into unstable (Simon Josefsson)
  • [2025-10-14] rekor 1.4.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-09] Accepted rekor 1.4.2-1 (source) into unstable (Simon Josefsson)
  • [2025-09-23] rekor 1.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-19] Accepted rekor 1.4.0-1 (source) into unstable (Simon Josefsson)
  • [2025-05-14] Accepted rekor 1.3.10-1 (source) into experimental (Simon Josefsson)
  • [2025-04-12] rekor 1.3.9-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-10] Accepted rekor 1.3.9-1 (source) into unstable (Simon Josefsson)
  • [2025-01-18] rekor 1.3.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-15] Accepted rekor 1.3.7-1 (source) into unstable (Simon Josefsson)
  • [2024-10-27] rekor 1.3.6-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-24] Accepted rekor 1.3.6-2 (source) into unstable (Simon Josefsson)
  • [2024-09-27] rekor 1.3.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-23] Accepted rekor 1.3.6-1 (source) into unstable (Simon Josefsson)
  • [2024-06-29] rekor 1.3.5-2 MIGRATED to testing (Debian testing watch)
  • [2024-06-23] Accepted rekor 1.3.5-2 (source) into unstable (Reinhard Tartler)
  • [2024-02-18] Accepted rekor 1.3.5-1 (source) into experimental (Simon Josefsson)
  • [2024-02-15] Accepted rekor 1.3.4-1 (source all amd64) into experimental (Debian FTP Masters) (signed by: Simon Josefsson)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.5.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing