An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://kyverno.io/docs/writing-policies/verify-images/ | product |
https://github.com/kyverno/kyverno/compare/v1.8.4...v1.8.5 | third party advisory patch |
https://github.com/kyverno/kyverno/releases/tag/v1.8.5 | third party advisory release notes |
https://github.com/kyverno/kyverno/pull/5713 | third party advisory patch |
https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm | third party advisory patch |