Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/sigstore/gitsign
  4. ›
  5. CVE-2026-44310

CVE-2026-44310: gitsign --verify panics on empty-certificate PKCS7 and exits 0, bypassing exit-code callers

May 8, 2026

CertVerifier.Verify() in pkg/git/verifier.go unconditionally dereferences certs[0] after sd.GetCertificates() without checking the slice length. A CMS/PKCS7 signed message with an empty certificate set is a structurally valid DER payload; GetCertificates() returns an empty slice with no error, causing an immediate index-out-of-range panic. On the gitsign --verify code path (the GPG-compatible mode invoked by git verify-commit), the panic is silently recovered by internal/io/streams.go’s Wrap() function, which returns nil instead of an error. main.go then exits with code 0, causing exit-code-only verification callers to interpret the failed verification as success.

References

  • github.com/advisories/GHSA-7c37-gx6w-8vc5
  • github.com/sigstore/gitsign
  • github.com/sigstore/gitsign/security/advisories/GHSA-7c37-gx6w-8vc5
  • nvd.nist.gov/vuln/detail/CVE-2026-44310

Code Behaviors & Features

Detect and mitigate CVE-2026-44310 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.4.0 before 0.15.0

Fixed versions

  • 0.15.0

Solution

Upgrade to version 0.15.0 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-129: Improper Validation of Array Index
  • CWE-390: Detection of Error Condition Without Action

Source file

go/github.com/sigstore/gitsign/CVE-2026-44310.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:29 +0000.