Debian Package Tracker
Register | Log in
Subscribe

rekor

Software Supply Chain Transparency Log (program)

Choose email to subscribe with

general
  • source: rekor (main)
  • version: 1.4.3-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Reinhard Tartler [DMD] – Simon Josefsson [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 1.3.9-1
  • testing: 1.4.3-1
  • unstable: 1.4.3-1
versioned links
  • 1.3.9-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-sigstore-rekor-dev
  • rekor
action needed
A new upstream version is available: 1.5.0 high
A new upstream version 1.5.0 is available, you should consider packaging it.
Created: 2026-01-25 Last update: 2026-01-27 22:01
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-23831: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
  • CVE-2026-24117: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.
Created: 2026-01-23 Last update: 2026-01-23 20:33
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-23831: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
  • CVE-2026-24117: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.
Created: 2026-01-23 Last update: 2026-01-23 20:33
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-23831: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
  • CVE-2026-24117: Rekor is a software supply chain transparency log. In versions 1.4.3 and below, attackers can trigger SSRF to arbitrary internal services because /api/v1/index/retrieve supports retrieving a public key via user-provided URL. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. The issue has been fixed in version 1.5.0. To workaround this issue, disable the search endpoint with --enable_retrieve_api=false.
Created: 2026-01-23 Last update: 2026-01-23 20:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-12-18] rekor 1.4.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-08] Accepted rekor 1.4.3-1 (source) into unstable (Simon Josefsson)
  • [2025-10-14] rekor 1.4.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-09] Accepted rekor 1.4.2-1 (source) into unstable (Simon Josefsson)
  • [2025-09-23] rekor 1.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-19] Accepted rekor 1.4.0-1 (source) into unstable (Simon Josefsson)
  • [2025-05-14] Accepted rekor 1.3.10-1 (source) into experimental (Simon Josefsson)
  • [2025-04-12] rekor 1.3.9-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-10] Accepted rekor 1.3.9-1 (source) into unstable (Simon Josefsson)
  • [2025-01-18] rekor 1.3.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-15] Accepted rekor 1.3.7-1 (source) into unstable (Simon Josefsson)
  • [2024-10-27] rekor 1.3.6-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-24] Accepted rekor 1.3.6-2 (source) into unstable (Simon Josefsson)
  • [2024-09-27] rekor 1.3.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-23] Accepted rekor 1.3.6-1 (source) into unstable (Simon Josefsson)
  • [2024-06-29] rekor 1.3.5-2 MIGRATED to testing (Debian testing watch)
  • [2024-06-23] Accepted rekor 1.3.5-2 (source) into unstable (Reinhard Tartler)
  • [2024-02-18] Accepted rekor 1.3.5-1 (source) into experimental (Simon Josefsson)
  • [2024-02-15] Accepted rekor 1.3.4-1 (source all amd64) into experimental (Debian FTP Masters) (signed by: Simon Josefsson)
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.3.9-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing