Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-273p-m2cw-6833 Rekor's COSE v0.0.1 entry type nil pointer dereference in Canonicalize via empty Message
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 23 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implementation can panic on attacker-controlled input when canonicalizing a proposed entry with an empty spec.message, causing nil Pointer Dereference. Function validate() returns nil (success) when message is empty, leaving sign1Msg uninitialized, and Canonicalize() later dereferences v.sign1Msg.Payload. A malformed proposed entry of the cose/v0.0.1 type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal. This issue has been fixed in version 1.5.0.
Title Rekor COSE v0.0.1 Canonicalize crashes when passed empty Message
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T21:26:22.183Z

Reserved: 2026-01-16T15:46:40.841Z

Link: CVE-2026-23831

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T22:16:19.523

Modified: 2026-01-22T22:16:19.523

Link: CVE-2026-23831

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-22T21:26:22Z

Links: CVE-2026-23831 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses