CVE-2026-25727
Vulnerability
CVE-2026-25727
CVE-2026-25727
 time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
References
- launchpad.net/ubuntu-cve-tracker: https://github.com/advisories/GHSA-r6v5-fh4h-64xc
- launchpad.net/ubuntu-cve-tracker: https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05
- launchpad.net/ubuntu-cve-tracker: https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee
- launchpad.net/ubuntu-cve-tracker: https://github.com/time-rs/time/releases/tag/v0.3.47
- launchpad.net/ubuntu-cve-tracker: https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc
- launchpad.net/ubuntu-cve-tracker: https://rustsec.org/advisories/RUSTSEC-2026-0009.html
- launchpad.net/ubuntu-cve-tracker: https://www.cve.org/CVERecord?id=CVE-2026-25727
severitym
medium
type: vendor
source: launchpad.net/ubuntu-cve-tracker
published: 2026-02-07 00:00:00
Detection
No detection criteria available for this vulnerability.
Data Sources
- Ubuntu CVE Tracker
ubuntu-cve-tracker