Vulnerability Description
gittuf is a platform-agnostic Git security system. Prior to 0.14.0, an attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted by the current set of root keys. gittuf determines the policy to load by inspecting the RSL. Except for the very first policy (which is automatically trusted given gittuf's TOFU model, or verified against manually specified keys), whenever an RSL entry that points to a new policy is encountered, gittuf validates that this policy is trusted. This is done by checking that the new policy’s root metadata is signed by the required threshold of the current policy's root keys. Because of this, an attacker with push access to the RSL may create a new entry that references an old policy (that is trusted by the most recent policy's set of root keys), thereby rolling back gittuf's policy to the attacker's chosen state. This vulnerability is fixed in 0.14.0.
Related Weaknesses (CWE)
References
- https://github.com/gittuf/gittuf/commit/dd76efa505f9137a4a9a625c5ac67b333365a1b8
- https://github.com/gittuf/gittuf/security/advisories/GHSA-vxvc-cg7j-rwqj
FAQ
What is CVE-2026-44544?
CVE-2026-44544 is a documented vulnerability. gittuf is a platform-agnostic Git security system. Prior to 0.14.0, an attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted b...
How severe is CVE-2026-44544?
CVSS scoring is not yet available for CVE-2026-44544. Check NVD for updates.
Is there a patch for CVE-2026-44544?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.