Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. sequoia-git
  4. ›
  5. GHSA-g27r-r6ph-vf5r

GHSA-g27r-r6ph-vf5r: sequoia-git has broken hard revocation handling

May 4, 2026

Before sq-git checks if a commit can be authenticated, it first looks for hard revocations. Because parsing a policy is expensive and a project’s policy rarely changes, sq-git has an optimization to only check a policy if it hasn’t checked it before. It does this by maintaining a set of policies that it had already seen keyed on the policy’s hash. Unfortunately, due to a bug the hash was truncated to be 0 bytes and thus only hard revocations in the target commit were considered. Normally this is not a problem as hard revocations are not removed from the signing policy.

An attacker could nevertheless exploit this flaw as follows. Consider Alice and Bob who maintain a project together. If Bob’s certificate is compromised and Bob issues a hard revocation, Alice can add it to the project’s signing policy. An attacker who has access to Bob’s key can then create a merge request that strips the hard revocation. If Alice merges Bob’s merge request, then the latest commit will not carry the hard revocation, and sq-git will not see the hard revocation when authenticating that commit or any following commits.

Note: for this attack to be successful, Alice needs to be tricked into merging the malicious MR. If Alice is reviewing MRs, then she is likely to notice changes to the signing policy.

Reported-by: Hassan Sheet

References

  • github.com/advisories/GHSA-g27r-r6ph-vf5r
  • gitlab.com/sequoia-pgp/sequoia-git
  • gitlab.com/sequoia-pgp/sequoia-git/-/commit/f9c9074bd80023456221f09c3c4ff19957ee9c58
  • rustsec.org/advisories/RUSTSEC-2026-0109.html

Code Behaviors & Features

Detect and mitigate GHSA-g27r-r6ph-vf5r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.6.0

Fixed versions

  • 0.6.0

Solution

Upgrade to version 0.6.0 or above.

Impact 2 LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-299: Improper Check for Certificate Revocation

Source file

cargo/sequoia-git/GHSA-g27r-r6ph-vf5r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:22 +0000.