First published: Wed Dec 21 2022(Updated: )
### Impact Users of Kyverno on versions 1.8.3 or 1.8.4 who use `verifyImages` rules to verify container image signatures, and do not prevent use of unknown registries. ### Patches This issue has been fixed in version [1.8.5](https://github.com/kyverno/kyverno/releases/tag/v1.8.5) ### Workarounds Configure a Kyverno policy to restrict registries to a set of secure trusted image registries ([sample](https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registries/)). ### References
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/kyverno/kyverno | >=1.8.3<1.8.5 | 1.8.5 |
Kyverno Kyverno | =1.8.3 | |
Kyverno Kyverno | =1.8.4 | |
=1.8.3 | ||
=1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Kyverno security issue is CVE-2022-47633.
The impact of this vulnerability is that it allows a malicious image to bypass signature validation in Kyverno 1.8.3 and 1.8.4.
Versions 1.8.3 and 1.8.4 of Kyverno are affected by this vulnerability.
To fix this vulnerability, update to version 1.8.5 of Kyverno.
You can find more information about this vulnerability in the Kyverno security advisories, pull request, and release notes.