CVE-2022-35930

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-35930
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-35930.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-35930
Aliases
Related
Published
2022-08-04T21:15:15Z
Modified
2025-12-04T10:27:13.587499Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Ability to bypass attestation verification in sigstore PolicyController
Details

PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to "custom"). An example image that can be used to test this is ghcr.io/distroless/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2. Users should upgrade to version 0.2.1 to resolve this issue. There are no workarounds for users unable to upgrade.

Database specific
{
    "cwe_ids": [
        "CWE-347"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/35xxx/CVE-2022-35930.json"
}
References

Affected packages

Git / github.com/sigstore/policy-controller

Affected ranges

Type
GIT
Repo
https://github.com/sigstore/policy-controller
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.0-rc.1
v0.2.0-rc.2