GHSA-H829-5CG7-6HFF: Improper Tag Signature Verification in Gitverify
Vulnerability ID: GHSA-H829-5CG7-6HFF
CVSS Score: 5.3
Published: 2026-04-24
The gitverify tool contains a logic inversion vulnerability in its signature verification routines. This flaw allows unsigned annotated Git tags to bypass security policies intended to enforce cryptographic signatures.
TL;DR
A logic inversion in gitverify allows unsigned annotated Git tags to bypass security policies. Attackers can inject unsigned references into supply chains relying on this tool for integrity verification.
Technical Details
- CWE ID: CWE-347
- Secondary CWE: CWE-697
- Attack Vector: Network
- CVSS Score: 5.3
- Impact: Integrity Bypass
- Exploit Status: None
Affected Systems
- github.com/supply-chain-tools/gitverify
-
gitverify: < c2c60da05d5c73621d0ce7ea02770bacd79ec8b1 (Fixed in:
c2c60da05d5c73621d0ce7ea02770bacd79ec8b1)
Code Analysis
Commit: c2c60da
Fix logic inversion in tag signature verification
--- a/gitverify/verify.go
+++ b/gitverify/verify.go
@@ -711,7 +711,7 @@ func validateTag(tag *plumbing.Reference, state *gitkit.RepoState, repoConfig *R
return err
}
case SignatureTypeNone:
- if !repoConfig.requireSignedTags {
+ if repoConfig.requireSignedTags {
return fmt.Errorf("unsigned annotated tag: %s", t.Name)
}
default:
Mitigation Strategies
- Update the github.com/supply-chain-tools/gitverify package to the patched version.
- Implement independent commit signature verification in CI/CD pipelines as a defense-in-depth measure.
Remediation Steps:
- Identify all projects and pipelines utilizing the github.com/supply-chain-tools/gitverify package.
- Update the package dependency to include commit c2c60da05d5c73621d0ce7ea02770bacd79ec8b1.
- Recompile any static binaries that incorporate the gitverify library.
- Verify the fix by pushing an unsigned annotated tag to a test repository and confirming that gitverify correctly rejects it.
References
Read the full report for GHSA-H829-5CG7-6HFF on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)