Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-739f-hw6h-7wq8: PolicyController before 0.2.1 may bypass attestation verification

PolicyController will report a false positive, resulting in an admission when it should not be admitted when:

  • There is at least one attestation with a valid signature
  • There are NO attestations of the type being verified (–type defaults to “custom”)

Users should upgrade to cosign version 0.2.1 or greater for a patch. There are no known workarounds at this time.

ghsa
#git

PolicyController before 0.2.1 may bypass attestation verification

High severity GitHub Reviewed Published Aug 10, 2022 in sigstore/policy-controller • Updated Aug 10, 2022

Related news

CVE-2022-35930: Merge pull request from GHSA-739f-hw6h-7wq8 · sigstore/policy-controller@e852af3

PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to "custom"). An example image that can be used to test this is `ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2`. Users should upgrade to version 0.2.1 to resolve this issue. There are no workarounds for users unable to upgrade.