CVE-2026-25727

Source
https://cve.org/CVERecord?id=CVE-2026-25727
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25727.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25727
Aliases
Downstream
Related
Published
2026-02-06T19:20:56.298Z
Modified
2026-02-20T02:45:38.912483Z
Severity
  • 6.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H CVSS Calculator
Summary
time affected by a stack exhaustion denial of service attack
Details

time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25727.json",
    "cwe_ids": [
        "CWE-121"
    ]
}
References

Affected packages

Git / github.com/time-rs/time

Affected ranges

Type
GIT
Repo
https://github.com/time-rs/time
Events

Affected versions

v0.*
v0.3.10
v0.3.11
v0.3.12
v0.3.13
v0.3.14
v0.3.15
v0.3.16
v0.3.17
v0.3.18
v0.3.19
v0.3.20
v0.3.21
v0.3.22
v0.3.23
v0.3.24
v0.3.25
v0.3.26
v0.3.27
v0.3.28
v0.3.29
v0.3.30
v0.3.31
v0.3.32
v0.3.33
v0.3.34
v0.3.35
v0.3.36
v0.3.37
v0.3.38
v0.3.39
v0.3.40
v0.3.41
v0.3.42
v0.3.43
v0.3.44
v0.3.45
v0.3.46
v0.3.6
v0.3.7
v0.3.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25727.json"