Rekor's compressed archives can result in OOM conditions
CVE-2023-30551
7.5HIGH
What is CVE-2023-30551?
Rekor, an open-source tool for software supply chain transparency, is susceptible to crashes due to out of memory (OOM) conditions. This issue arises when the application processes large archive metadata files without adequately checking their sizes. Specifically, when verifying a JAR file or parsing an APK file, the presence of oversized files in the META-INF directory or the .SIGN and .PKGINFO files can lead to an OOM crash. The vulnerability has been resolved in Rekor version 1.1.1, with no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
rekor < 1.1.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
