Vulnerabilities > CVE-2023-30551 - Unspecified vulnerability in Linuxfoundation Rekor
Summary
Rekor is an open source software supply chain transparency log. Rekor prior to version 1.1.1 may crash due to out of memory (OOM) conditions caused by reading archive metadata files into memory without checking their sizes first. Verification of a JAR file submitted to Rekor can cause an out of memory crash if files within the META-INF directory of the JAR are sufficiently large. Parsing of an APK file submitted to Rekor can cause an out of memory crash if the .SIGN or .PKGINFO files within the APK are sufficiently large. The OOM crash has been patched in Rekor version 1.1.1. There are no known workarounds.
Vulnerable Configurations
References
- https://github.com/sigstore/rekor/commit/cf42ace82667025fe128f7a50cf6b4cdff51cc48
- https://github.com/sigstore/rekor/releases/tag/v1.1.1
- https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9
- https://github.com/sigstore/rekor/commit/cf42ace82667025fe128f7a50cf6b4cdff51cc48
- https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9
- https://github.com/sigstore/rekor/releases/tag/v1.1.1