Source: gittuf
Version: 0.12.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for gittuf.

CVE-2026-44544[0]:
| gittuf is a platform-agnostic Git security system. Prior to 0.14.0,
| an attacker with push access to gittuf's Reference State Log (RSL)
| can roll back the current policy to any previous policy trusted by
| the current set of root keys. gittuf determines the policy to load
| by inspecting the RSL. Except for the very first policy (which is
| automatically trusted given gittuf's TOFU model, or verified against
| manually specified keys), whenever an RSL entry that points to a new
| policy is encountered, gittuf validates that this policy is trusted.
| This is done by checking that the new policy’s root metadata is
| signed by the required threshold of the current policy's root keys.
| Because of this, an attacker with push access to the RSL may create
| a new entry that references an old policy (that is trusted by the
| most recent policy's set of root keys), thereby rolling back
| gittuf's policy to the attacker's chosen state.  This vulnerability
| is fixed in 0.14.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-44544
    https://www.cve.org/CVERecord?id=CVE-2026-44544
[1] https://github.com/gittuf/gittuf/security/advisories/GHSA-vxvc-cg7j-rwqj

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to