-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-47534 for github.com/theupdateframework/go-tuf 0.7.0 #2237
Comments
This vulnerability does not affect rekor. We will leave this open as we investigate upgrading to go-TUF v2. |
Awesome thank you @haydentherapper ! |
Hi @onelapahead , Hi @haydentherapper , My passion for this issue led me here, and I'd appreciate your insights on this matter. |
go-tuf v0.7.0 is not affected by the vulnerability. I've discussed this with the go-tuf maintainers and they'll be updated the GHSA. Even if v0.7.0 was affected, our usage of go-tuf in Rekor does not use the vulnerable API. We won't be prioritizing an update to go-tuf v2 as the type will be deprecated - #2080 |
Description
Using
cosign
,sigstore
, andrekor
as Go dependencies in our tooling, our CVE scanners (trivy / AquaDB) has flagged a new HIGH CVE that states:https://avd.aquasec.com/nvd/2024/cve-2024-47534/
Looking at the code briefly, the issue that
rekor
still uses 0.7.0 of TUF rather than migrating to TUF 2.x (which it looks likecosign
has upgraded to). Its unclear how complex this upgrade would be, and if theres any migration involved.Questions
NOTE: I did not go through the vulnerability disclosure process because 1) this CVE is already publicly disclosed, 2) its not clear if
rekor
is actually impacted by this CVE.The text was updated successfully, but these errors were encountered: