{"id":"AZL-76821","summary":"CVE-2026-25727 affecting package azl-compliance for versions less than 1.0.2-3","details":"time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.","modified":"2026-04-01T05:22:59.969807Z","published":"2026-02-06T20:16:11Z","upstream":["CVE-2026-25727"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25727"}],"affected":[{"package":{"name":"azl-compliance","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/azl-compliance"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76821.json"}}],"schema_version":"1.7.5"}