{"id":"AZL-77087","summary":"CVE-2026-25727 affecting package rust 1.75.0-25","details":"time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.","modified":"2026-04-01T05:23:04.185705Z","published":"2026-02-06T20:16:11Z","upstream":["CVE-2026-25727"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25727"}],"affected":[{"package":{"name":"rust","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/rust"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"1.75.0-25"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-77087.json"}}],"schema_version":"1.7.5"}