Vulnerability DatabaseGHSA-j8x2-777p-23fc

GHSA-j8x2-777p-23fc
Rust vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-j8x2-777p-23fc) affects the tough Rust client library for TUF (The Update Framework) repositories in versions prior to 0.20.0. The issue involves the library's failure to detect cyclical role delegations in TUF repositories, where the targets role can delegate trust to other roles for signing target file metadata (GitHub Advisory, AWS Security Bulletin).

Technical details

In TUF repositories, the targets role's signature indicates which target files are trusted by clients, with the ability to delegate full or partial trust to other roles for signing target file metadata. When searching for metadata about a given target, tough failed to detect cyclical role delegations in the delegation graph. The vulnerability has been assigned a CVSS score of 2.7 (Low) with the following vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N (GitHub Advisory).

Impact

When interacting with TUF repositories containing cyclical role delegations, the vulnerability causes tough to exhaust its stack while recursively searching the delegation graph. This stack exhaustion results in process abortion, potentially affecting the availability of systems using the library (GitHub Advisory).

Mitigation and workarounds

A fix for this issue is available in tough version 0.20.0 and later. Users are advised to upgrade to version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes. There are no recommended workarounds, and customers should proceed with the upgrade to the patched version (GitHub Advisory, AWS Security Bulletin).

Community reactions

The vulnerability was identified by the TUF-Conformance project, with Google collaborating on the issue through the coordinated vulnerability disclosure process (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management