[SUSE-SU-2024:0460-1] Security update for rekor
Security update for rekor
This update for rekor fixes the following issues:
update to 1.3.5 (jsc#SLE-23476):
- Additional unique index correction
- Remove timestamp from checkpoint
- Drop conditional when verifying entry checkpoint
- Fix panic for DSSE canonicalization
- Change Redis value for locking mechanism
- give log timestamps nanosecond precision
output trace in slog and override correlation header name
bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207)
Updated to 1.3.4:
- add mysql indexstorage backend
- add s3 storage for attestations
- fix: Do not check for pubsub.topics.get on initialization
- fix optional field in cose schema
- Update ranges.go
- update indexstorage interface to reduce roundtrips
- use a single validator library in rekor-cli
- Remove go-playground/validator dependency from pkg/pki
Updated to rekor 1.3.3 (jsc#SLE-23476):
- Update signer flag description
- update trillian to 1.5.3
- adds redis_auth
- Add method to get artifact hash for an entry
- make e2e tests more usable with docker-compose
- install go at correct version for codeql
Updated to rekor 1.3.2 (jsc#SLE-23476):
Updated to rekor 1.3.1 (jsc#SLE-23476):
New Features:
- enable GCP cloud profiling on rekor-server (#1746)
- move index storage into interface (#1741)
- add info to readme to denote additional documentation sources (#1722)
- Add type of ed25519 key for TUF (#1677)
Allow parsing base64-encoded TUF metadata and root content (#1671)
Quality Enhancements:
disable quota in trillian in test harness (#1680)
Bug Fixes:
Update contact for code of conduct (#1720)
Fix panic when parsing SSH SK pubkeys (#1712)
Correct index creation (#1708)
docs: fixzes a small typo on the readme (#1686)
chore: fix backfill-redis Makefile target (#1685)
Updated to rekor 1.3.0 (jsc#SLE-23476):
- Update openapi.yaml (#1655)
- pass transient errors through retrieveLogEntry (#1653)
- return full entryID on HTTP 409 responses (#1650)
- feat: Support publishing new log entries to Pub/Sub topics (#1580)
- Change values of Identity.Raw, add fingerprints (#1628)
- Extract all subjects from SANs for x509 verifier (#1632)
- Fix type comment for Identity struct (#1619)
- Refactor Identities API (#1611)
- Refactor Verifiers to return multiple keys (#1601)
- Update checkpoint link (#1597)
- Use correct log index in inclusion proof (#1599)
- remove instrumentation library (#1595)
Updated to rekor 1.2.2 (jsc#SLE-23476):
- pass down error with message instead of nil
swap killswitch for 'docker-compose restart'
CVE-2023-48795: Fixed Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207).
Package | Affected Version |
---|---|
pkg:rpm/suse/rekor?arch=x86_64&distro=opensuse-leap-15.5 | < 1.3.5-150400.4.19.1 |
pkg:rpm/suse/rekor?arch=s390x&distro=opensuse-leap-15.5 | < 1.3.5-150400.4.19.1 |
pkg:rpm/suse/rekor?arch=ppc64le&distro=opensuse-leap-15.5 | < 1.3.5-150400.4.19.1 |
pkg:rpm/suse/rekor?arch=aarch64&distro=opensuse-leap-15.5 | < 1.3.5-150400.4.19.1 |
- ID
- SUSE-SU-2024:0460-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20240460-1/
- Published
-
2024-02-13T14:29:55
(7 months ago) - Modified
-
2024-02-13T14:29:55
(7 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1898
- ALAS2-2023-2376
- ALPINE:CVE-2023-48795
- ALSA-2024:0606
- ALSA-2024:0628
- ALSA-2024:1130
- ALSA-2024:1150
- DSA-5586-1
- DSA-5588-1
- DSA-5591-1
- DSA-5599-1
- DSA-5600-1
- DSA-5601-1
- DSA-5750-1
- ELSA-2024-0606
- ELSA-2024-0628
- ELSA-2024-1130
- ELSA-2024-1150
- ELSA-2024-12157
- ELSA-2024-12158
- ELSA-2024-12164
- ELSA-2024-12232
- ELSA-2024-12233
- ELSA-2024-2988
- FEDORA-2023-0733306be9
- FEDORA-2023-153404713b
- FEDORA-2023-20feb865d8
- FEDORA-2023-55800423a8
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-e77300e4b5
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-2705241461
- FEDORA-2024-37627e432e
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-71c2c6526c
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7e301327c2
- FEDORA-2024-a53b24023d
- FEDORA-2024-ae653fb07b
- FEDORA-2024-d946b9ad25
- FEDORA-2024-fb32950d11
- FREEBSD:0F7598CC-9FE2-11EE-B47F-901B0E9408DC
- FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
- FREEBSD:4EBDD56B-FE72-11EE-BC57-00E081B7AA2D
- FREEBSD:91955195-9EBB-11EE-BC14-A703705DB3A6
- FREEBSD:B5E22EC5-BC4B-11EE-B0B5-B42E991FC52E
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202407-11
- GLSA-202407-12
- GO-2023-2402
- JENKINS:SECURITY-3333
- JENKINS:SECURITY-3386
- openSUSE-SU-2023:0411-1
- openSUSE-SU-2023:0421-1
- openSUSE-SU-2024:0005-1
- openSUSE-SU-2024:0008-1
- openSUSE-SU-2024:0036-1
- RHBA-2024:1127
- RHBA-2024:1136
- RHSA-2024:0606
- RHSA-2024:0628
- RHSA-2024:1130
- RHSA-2024:1150
- RHSA-2024:2988
- RLSA-2024:0606
- RLSA-2024:0628
- SSA:2023-353-01
- SSA:2023-354-01
- SUSE-SU-2023:4902-1
- SUSE-SU-2023:4903-1
- SUSE-SU-2023:4904-1
- SUSE-SU-2023:4905-1
- SUSE-SU-2023:4946-1
- SUSE-SU-2024:0006-1
- SUSE-SU-2024:0035-1
- SUSE-SU-2024:0140-1
- SUSE-SU-2024:0210-1
- SUSE-SU-2024:0224-1
- SUSE-SU-2024:0327-1
- SUSE-SU-2024:0430-1
- SUSE-SU-2024:0525-1
- SUSE-SU-2024:0539-1
- SUSE-SU-2024:0543-1
- SUSE-SU-2024:0558-1
- SUSE-SU-2024:0972-1
- SUSE-SU-2024:0974-1
- USN-6560-1
- USN-6560-2
- USN-6561-1
- USN-6585-1
- USN-6589-1
- USN-6598-1
- USN-6738-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0460-1.json | |
Suse | URL for SUSE-SU-2024:0460-1 | https://www.suse.com/support/update/announcement/2024/suse-su-20240460-1/ | |
Suse | E-Mail link for SUSE-SU-2024:0460-1 | https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html | |
Bugzilla | SUSE Bug 1218207 | https://bugzilla.suse.com/1218207 | |
CVE | SUSE CVE CVE-2023-48795 page | https://www.suse.com/security/cve/CVE-2023-48795/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/rekor?arch=x86_64&distro=opensuse-leap-15.5 | suse | rekor | < 1.3.5-150400.4.19.1 | opensuse-leap-15.5 | x86_64 | |
Affected | pkg:rpm/suse/rekor?arch=s390x&distro=opensuse-leap-15.5 | suse | rekor | < 1.3.5-150400.4.19.1 | opensuse-leap-15.5 | s390x | |
Affected | pkg:rpm/suse/rekor?arch=ppc64le&distro=opensuse-leap-15.5 | suse | rekor | < 1.3.5-150400.4.19.1 | opensuse-leap-15.5 | ppc64le | |
Affected | pkg:rpm/suse/rekor?arch=aarch64&distro=opensuse-leap-15.5 | suse | rekor | < 1.3.5-150400.4.19.1 | opensuse-leap-15.5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |