Sort of --- but likely not in the way that you imagine.
By this, I mean that what you want exists in the lattice-crypto world. I imagine it means it exists (or you could make it work) in the code-based crypto world as well, but I don't work in that world/can't comment on that as much.
In lattice-based crypto (or in the algorithmic theory of euclidean lattices more generally), there are "packing" and "covering" problems.
By this I mean
Packing: Given a lattice point $\ell\in L$ ("codeword") perturbed by a small amount $e$ (less than the "packing radius" $\lambda_1(L)/2$), recover $\ell$ from $\ell + e$.
Covering: Given an arbitrary point $x \in \mathbb{R}^n\supseteq L$, find the nearest point $\ell\in L$, of distance at most the covering radius $\rho(L)$ of the lattice from $x$.
There are of course approximate versions of the above as well (where one replaces the bounds $\lambda_1(L)/2$ and $\rho(L)$ by $\gamma\lambda_1(L)/2$ and $\gamma\rho(L)$ for some $\gamma \geq 1$).
Anyway, some problems (exact CVP) can be used to solve both of the above lattice problems.
If one doesn't have an exact CVP oracle though (and instead can only solve approximate CVP for some approximation factor), the situation bifurcates.
Namely
Oracles for "CVP with a distance guaranteed" (or Bounded Distance Decoding). $\mathsf{SVP}_\gamma$ can often be solved with oracles of this type
Oracles for "Absolute Distance Decoding". $\mathsf{SIVP}_\gamma$ can often be solved with oracles of this type (or --- knowing a short dual basis often suffices for approximately solving "covering" problems)
One way of reading your question (in the lattice world, which is not the code world, but is often related) is whether one can get signatures from covering-type assumptions, for example from $\mathsf{SIVP}_\gamma$ instead of $\mathsf{SVP}_\gamma$ (LWE, via the worst-case to average-case reductions, relies on the worst-case hardness of $\mathsf{SVP}_\gamma$).
The answer is easily "yes".
In particular Lybushavesky's "Fiat Shamir with Aborts" construction fits this paradigm.
Therefore, I would expect a similar coding-based construction to be able to be based on a covering-type problem.
This paper (on page 2) makes it sound like such a construction is not known though, but progress in this area morally feels like it would be relevant to your question.
Note that other lattice-based signatures ("Hash-and-Sign") can similarly be seen from this perspective. One first hashes the message to an arbitrary point in $\mathbb{R}^n$, then uses a short basis to round this to the nearest point of the lattice, i.e. you solve the covering problem on that lattice.
Second, the closest analogue to code-based signatures (which you seem to be interested in) in the lattices context are "GGH signatures". These were proposed in the 90's, and are famously insecure (them, as well as NTRUSign, are two of the initial attempts at lattice-based signatures.
These are notoriously tricky, to the point that we were able to construct FHE before signatures from standard lattice problems iirc).
Anyway, there is a recent attempt to redo GGH signatures in the context of lattice-based crypto.
These are known as signatures from the Lattice Isomorphism Problem (see here for a sample construction).
This led to the Hawk signature scheme.
It has a "compressed variant" where you take a signature $(s_0, s_1)$, "drop" $s_0$, and then later reconstruct it as $s_0'\approx s_0$.
It seems highly likely to me that you can view this form of compression as applying a particular "lattice-based" covering code to $s_0$, so this is perhaps close to what you're interested in.
You could plausibly post-process $(s_0, s_1)$ via some other (lattice-based) covering code instead, but I don't know if anyone has done this yet.