Debian Package Tracker
Register | Log in
Subscribe

gittuf

security layer for Git repositories (program)

Choose email to subscribe with

general
  • source: gittuf (main)
  • version: 0.12.0-2
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Simon Josefsson [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 0.9.0-5
  • testing: 0.12.0-2
  • unstable: 0.12.0-2
  • exp: 0.13.1-1~exp1
versioned links
  • 0.9.0-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.12.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.13.1-1~exp1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gittuf
  • golang-github-gittuf-gittuf-dev
action needed
Marked for autoremoval on 21 June due to docker.io: #1136031 high
Version 0.12.0-2 of gittuf is marked for autoremoval from testing on Sun 21 Jun 2026. It depends (transitively) on docker.io, affected by #1136031. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-05-15 Last update: 2026-05-20 02:33
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:02:58
    Last run: 2026-04-19T19:19:12.000Z
    Previous status: unknown

  • testing: fail (log)
    The tests ran in 0:02:27
    Last run: 2025-08-15T10:35:57.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:02:18
    Last run: 2026-05-19T07:27:05.000Z
    Previous status: unknown

Created: 2025-02-01 Last update: 2026-05-20 02:01
A new upstream version is available: 0.14.1 high
A new upstream version 0.14.1 is available, you should consider packaging it.
Created: 2026-03-06 Last update: 2026-05-19 21:02
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2026-03-15 Last update: 2026-05-19 03:01
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-44544: gittuf is a platform-agnostic Git security system. Prior to 0.14.0, an attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted by the current set of root keys. gittuf determines the policy to load by inspecting the RSL. Except for the very first policy (which is automatically trusted given gittuf's TOFU model, or verified against manually specified keys), whenever an RSL entry that points to a new policy is encountered, gittuf validates that this policy is trusted. This is done by checking that the new policy’s root metadata is signed by the required threshold of the current policy's root keys. Because of this, an attacker with push access to the RSL may create a new entry that references an old policy (that is trusted by the most recent policy's set of root keys), thereby rolling back gittuf's policy to the attacker's chosen state. This vulnerability is fixed in 0.14.0.
Created: 2026-05-14 Last update: 2026-05-15 06:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-44544: gittuf is a platform-agnostic Git security system. Prior to 0.14.0, an attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted by the current set of root keys. gittuf determines the policy to load by inspecting the RSL. Except for the very first policy (which is automatically trusted given gittuf's TOFU model, or verified against manually specified keys), whenever an RSL entry that points to a new policy is encountered, gittuf validates that this policy is trusted. This is done by checking that the new policy’s root metadata is signed by the required threshold of the current policy's root keys. Because of this, an attacker with push access to the RSL may create a new entry that references an old policy (that is trusted by the most recent policy's set of root keys), thereby rolling back gittuf's policy to the attacker's chosen state. This vulnerability is fixed in 0.14.0.
Created: 2026-05-14 Last update: 2026-05-15 06:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-44544: gittuf is a platform-agnostic Git security system. Prior to 0.14.0, an attacker with push access to gittuf's Reference State Log (RSL) can roll back the current policy to any previous policy trusted by the current set of root keys. gittuf determines the policy to load by inspecting the RSL. Except for the very first policy (which is automatically trusted given gittuf's TOFU model, or verified against manually specified keys), whenever an RSL entry that points to a new policy is encountered, gittuf validates that this policy is trusted. This is done by checking that the new policy’s root metadata is signed by the required threshold of the current policy's root keys. Because of this, an attacker with push access to the RSL may create a new entry that references an old policy (that is trusted by the most recent policy's set of root keys), thereby rolling back gittuf's policy to the attacker's chosen state. This vulnerability is fixed in 0.14.0.
Created: 2026-05-14 Last update: 2026-05-15 06:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-26] gittuf 0.12.0-2 MIGRATED to testing (Debian testing watch)
  • [2026-03-16] Accepted gittuf 0.13.1-1~exp1 (source) into experimental (Simon Josefsson)
  • [2026-03-15] Accepted gittuf 0.13.1-1~exp0 (source) into experimental (Simon Josefsson)
  • [2026-03-15] Accepted gittuf 0.12.0-2 (source) into unstable (Simon Josefsson)
  • [2025-10-08] Accepted gittuf 0.12.0-1 (source) into unstable (Simon Josefsson)
  • [2025-09-08] gittuf REMOVED from testing (Debian testing watch)
  • [2025-04-25] gittuf 0.9.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-04-13] Accepted gittuf 0.9.0-5 (source) into unstable (Simon Josefsson)
  • [2025-04-13] gittuf 0.9.0-4 MIGRATED to testing (Debian testing watch)
  • [2025-04-10] Accepted gittuf 0.9.0-4 (source) into unstable (Simon Josefsson)
  • [2025-04-09] Accepted gittuf 0.9.0-3 (source) into unstable (Simon Josefsson)
  • [2025-03-16] Accepted gittuf 0.9.0-1 (source) into unstable (Simon Josefsson)
  • [2025-02-23] Accepted gittuf 0.8.0-3 (source) into unstable (Simon Josefsson)
  • [2025-02-22] Accepted gittuf 0.8.0-2 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Simon Josefsson)
  • [2025-01-22] Accepted gittuf 0.8.0-1 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Simon Josefsson)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, exp, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.12.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing