During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
References
Configurations
History
14 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Sep 2025, 14:30
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* | |
| Summary |
|
|
| First Time |
Amazon tough
Amazon |
|
| References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
| References | () https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.5 |
27 Mar 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-27 23:15
Updated : 2025-10-14 19:15
NVD link : CVE-2025-2887
Mitre link : CVE-2025-2887
CVE.ORG link : CVE-2025-2887
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-1025
Comparison Using Wrong Factors
