Vulnerability Description
Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This has been fixed in v1.2.0 of Rekor. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Rekor | < 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/sigstore/rekor/commit/140c5add105179e5ffd9e3e114fd1b6b93aebbdPatch
- https://github.com/sigstore/rekor/security/advisories/GHSA-frqx-jfcm-6jjrVendor Advisory
- https://github.com/sigstore/rekor/commit/140c5add105179e5ffd9e3e114fd1b6b93aebbdPatch
- https://github.com/sigstore/rekor/security/advisories/GHSA-frqx-jfcm-6jjrVendor Advisory
FAQ
What is CVE-2023-33199?
CVE-2023-33199 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. A malformed proposed entry of the `intoto/v0.0.2` type can cause a pani...
How severe is CVE-2023-33199?
CVE-2023-33199 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33199?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Rekor.