UBUNTU-CVE-2026-25727

Source
https://ubuntu.com/security/CVE-2026-25727
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25727.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-25727
Upstream
Published
2026-02-06T20:16:00Z
Modified
2026-02-12T05:31:37Z
Severity
  • 6.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

References

Affected packages

Ubuntu:20.04:LTS / rust-time

Package

Name
rust-time
Purl
pkg:deb/ubuntu/rust-time@0.1.42-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.1.42-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librust-time+rustc-serialize-dev",
            "binary_version": "0.1.42-1"
        },
        {
            "binary_name": "librust-time-dev",
            "binary_version": "0.1.42-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25727.json"

Ubuntu:22.04:LTS / rust-time

Package

Name
rust-time
Purl
pkg:deb/ubuntu/rust-time@0.3.5-3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.1.42-1
0.3.5-2
0.3.5-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librust-time-dev",
            "binary_version": "0.3.5-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25727.json"

Ubuntu:24.04:LTS / rust-time

Package

Name
rust-time
Purl
pkg:deb/ubuntu/rust-time@0.3.31-1ubuntu0.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.3.23-2
0.3.31-1
0.3.31-1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librust-time-dev",
            "binary_version": "0.3.31-1ubuntu0.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25727.json"

Ubuntu:25.10 / rust-time

Package

Name
rust-time
Purl
pkg:deb/ubuntu/rust-time@0.3.39-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.3.37-1
0.3.39-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librust-time-dev",
            "binary_version": "0.3.39-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25727.json"