Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03MzlmLWh3NmgtN3dxOM4AAt50
PolicyController before 0.2.1 may bypass attestation verification
PolicyController will report a false positive, resulting in an admission when it should not be admitted when:
- There is at least one attestation with a valid signature
- There are NO attestations of the type being verified (--type defaults to "custom")
Users should upgrade to cosign version 0.2.1 or greater for a patch. There are no known workarounds at this time.
Permalink: https://github.com/advisories/GHSA-739f-hw6h-7wq8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03MzlmLWh3NmgtN3dxOM4AAt50
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: over 1 year ago
CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-739f-hw6h-7wq8, CVE-2022-35930
References:
- https://github.com/sigstore/policy-controller/security/advisories/GHSA-739f-hw6h-7wq8
- https://nvd.nist.gov/vuln/detail/CVE-2022-35930
- https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8
- https://github.com/sigstore/policy-controller/releases/tag/v0.2.1
- https://github.com/advisories/GHSA-739f-hw6h-7wq8
Blast Radius: 0.0
Affected Packages
go:github.com/sigstore/policy-controller
Dependent packages: 2Dependent repositories: 1
Downloads:
Affected Version Ranges: < 0.2.1
Fixed in: 0.2.1
All affected versions: 0.1.0, 0.2.0
All unaffected versions: 0.2.1, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.5.1, 0.5.2, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.7.0, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4