{"id":"RUSTSEC-2026-0009","summary":"Denial of Service via Stack Exhaustion","details":"## Impact\n\nWhen user-provided input is provided to any type that parses with the RFC 2822 format, a denial of\nservice attack via stack exhaustion is possible. The attack relies on formally deprecated and\nrarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary,\nnon-malicious input will never encounter this scenario.\n\n## Patches\n\nA limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned\nrather than exhausting the stack.\n\n## Workarounds\n\nLimiting the length of user input is the simplest way to avoid stack exhaustion, as the amount of\nthe stack consumed would be at most a factor of the length of the input.","aliases":["CVE-2026-25727","GHSA-r6v5-fh4h-64xc"],"modified":"2026-02-06T09:17:04.230802Z","published":"2026-02-05T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/time"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0009.html"},{"type":"WEB","url":"https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05"}],"affected":[{"package":{"name":"time","ecosystem":"crates.io","purl":"pkg:cargo/time"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.3.6"},{"fixed":"0.3.47"}]}],"ecosystem_specific":{"affects":{"arch":[],"os":[],"functions":["time::Date::parse","time::OffsetDateTime::parse","time::PrimitiveDateTime::parse","time::Time::parse","time::UtcDateTime::parse","time::UtcOffset::parse","time::parsing::Parsed::parse_item"]},"affected_functions":null},"database_specific":{"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0009.json","informational":null,"cvss":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H","categories":["denial-of-service"]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H"}]}