PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to "custom"). An example image that can be used to test this is `ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2`. Users should upgrade to version 0.2.1 to resolve this issue. There are no workarounds for users unable to upgrade.
References
Link | Resource |
---|---|
https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8 | Patch Third Party Advisory |
https://github.com/sigstore/policy-controller/security/advisories/GHSA-739f-hw6h-7wq8 | Third Party Advisory |
https://github.com/sigstore/policy-controller/releases/tag/v0.2.1 | Third Party Advisory |
Configurations
Information
Published : 2022-08-04 15:15
Updated : 2022-08-11 11:14
NVD link : CVE-2022-35930
Mitre link : CVE-2022-35930
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
sigstore
- policy_controller