During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
References
Link | Resource |
---|---|
https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ | Vendor Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7 | Vendor Advisory |
Configurations
History
19 Sep 2025, 14:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.5 |
References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
References | () https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7 - Vendor Advisory | |
First Time |
Amazon tough
Amazon |
|
CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* |
27 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 23:15
Updated : 2025-09-19 14:30
NVD link : CVE-2025-2887
Mitre link : CVE-2025-2887
CVE.ORG link : CVE-2025-2887
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-1025
Comparison Using Wrong Factors