Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
References
Link | Resource |
---|---|
https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ | Vendor Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-5vmp-m5v2-hx47 | Vendor Advisory |
Configurations
History
19 Sep 2025, 14:31
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Amazon
Amazon tough |
|
CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* | |
References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
References | () https://github.com/awslabs/tough/security/advisories/GHSA-5vmp-m5v2-hx47 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.5 |
27 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 23:15
Updated : 2025-09-19 14:31
NVD link : CVE-2025-2885
Mitre link : CVE-2025-2885
CVE.ORG link : CVE-2025-2885
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-1288
Improper Validation of Consistency within Input