Headline
GHSA-739f-hw6h-7wq8: PolicyController before 0.2.1 may bypass attestation verification
PolicyController will report a false positive, resulting in an admission when it should not be admitted when:
- There is at least one attestation with a valid signature
- There are NO attestations of the type being verified (–type defaults to “custom”)
Users should upgrade to cosign version 0.2.1 or greater for a patch. There are no known workarounds at this time.
PolicyController before 0.2.1 may bypass attestation verification
High severity GitHub Reviewed Published Aug 10, 2022 in sigstore/policy-controller • Updated Aug 10, 2022
Related news
PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to "custom"). An example image that can be used to test this is `ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2`. Users should upgrade to version 0.2.1 to resolve this issue. There are no workarounds for users unable to upgrade.