Home

Description

time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

PUBLISHED Reserved 2026-02-05 | Published 2026-02-06 | Updated 2026-02-06 | Assigner GitHub_M




MEDIUM: 6.8CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

>= 0.3.6, < 0.3.47
affected

References

github.com/...s/time/security/advisories/GHSA-r6v5-fh4h-64xc

github.com/...ommit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee

github.com/time-rs/time/blob/main/CHANGELOG.md

github.com/time-rs/time/releases/tag/v0.3.47

cve.org (CVE-2026-25727)

nvd.nist.gov (CVE-2026-25727)

Download JSON