During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
References
Link | Resource |
---|---|
https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ | Vendor Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7 | Vendor Advisory |
Configurations
History
19 Sep 2025, 14:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* | |
First Time |
Amazon tough
Amazon |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.5 |
Summary |
|
|
References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
References | () https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7 - Vendor Advisory |
27 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 23:15
Updated : 2025-09-19 14:30
NVD link : CVE-2025-2887
Mitre link : CVE-2025-2887
CVE.ORG link : CVE-2025-2887
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-1025
Comparison Using Wrong Factors