{"id":"AZL-77030","summary":"CVE-2026-25727 affecting package librsvg2 2.58.1-5","details":"time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.","modified":"2026-04-01T05:23:03.130098Z","published":"2026-02-06T20:16:11Z","upstream":["CVE-2026-25727"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25727"}],"affected":[{"package":{"name":"librsvg2","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/librsvg2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"2.58.1-5"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-77030.json"}}],"schema_version":"1.7.5"}