Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-R6V5-FH4H-64XC
Vulnerability from github – Published: 2026-02-05 17:57 – Updated: 2026-02-23 22:34Impact
When user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario.
Patches
A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Workarounds
Limiting the length of user input is the simplest way to avoid stack exhaustion, as the amount of the stack consumed would be at most a factor of the length of the input.
Alternatively, avoiding the format altogether would also ensure that the vulnerability is not encountered. To do this, add
disallowed-types = ["time::format_description::well_known::Rfc2822"]
to your clippy.toml file. This will trigger the clippy::disallowed_types lint, which is warn-by-default and can be explicitly denied.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "time"
},
"ranges": [
{
"events": [
{
"introduced": "0.3.6"
},
{
"fixed": "0.3.47"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-25727"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-05T17:57:55Z",
"nvd_published_at": "2026-02-06T20:16:11Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nWhen user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario.\n\n### Patches\n\nA limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.\n\n### Workarounds\n\nLimiting the length of user input is the simplest way to avoid stack exhaustion, as the amount of the stack consumed would be at most a factor of the length of the input.\n\nAlternatively, avoiding the format altogether would also ensure that the vulnerability is not encountered. To do this, add\n\n```toml\ndisallowed-types = [\"time::format_description::well_known::Rfc2822\"]\n```\n\nto your `clippy.toml` file. This will trigger the `clippy::disallowed_types` lint, which is warn-by-default and can be explicitly denied.",
"id": "GHSA-r6v5-fh4h-64xc",
"modified": "2026-02-23T22:34:23Z",
"published": "2026-02-05T17:57:55Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25727"
},
{
"type": "WEB",
"url": "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee"
},
{
"type": "PACKAGE",
"url": "https://github.com/time-rs/time"
},
{
"type": "WEB",
"url": "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05"
},
{
"type": "WEB",
"url": "https://github.com/time-rs/time/releases/tag/v0.3.47"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0009.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"type": "CVSS_V4"
}
],
"summary": "time vulnerable to stack exhaustion Denial of Service attack"
}
cleanstart-2026-kn30288
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.6-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KN30288",
"modified": "2026-02-18T09:40:19Z",
"published": "2026-02-19T00:39:07.163109Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KN30288"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-2GH3-RMM4-6RQ5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-434X-W66G-QW3R"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-R6V5-FH4H-64XC"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-RHFX-M35P-FF5J"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-XWFJ-JGWM-7WP5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0",
"upstream": [
"GHSA-2GH3-RMM4-6RQ5",
"GHSA-434X-W66G-QW3R",
"GHSA-R6V5-FH4H-64XC",
"GHSA-RHFX-M35P-FF5J",
"GHSA-XWFJ-JGWM-7WP5"
]
}
cleanstart-2026-ej96468
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.5-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EJ96468",
"modified": "2026-03-25T05:09:00Z",
"published": "2026-04-01T09:22:08.656529Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EJ96468.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0",
"upstream": [
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-ev91316
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.6-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EV91316",
"modified": "2026-03-25T04:58:46Z",
"published": "2026-04-01T09:22:33.462978Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EV91316.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-hh87643
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.8-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HH87643",
"modified": "2026-03-25T04:50:32Z",
"published": "2026-04-01T09:22:32.645637Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HH87643.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-jm60128
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.4-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JM60128",
"modified": "2026-03-25T05:05:50Z",
"published": "2026-04-01T09:22:08.268986Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JM60128.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-pr84319
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.6-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PR84319",
"modified": "2026-02-13T12:28:27Z",
"published": "2026-02-14T00:37:23.085740Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PR84319"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-2GH3-RMM4-6RQ5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-R6V5-FH4H-64XC"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-RHFX-M35P-FF5J"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-XWFJ-JGWM-7WP5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-R6V5-FH4H-64XC, GHSA-RHFX-M35P-FF5J, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.27.5-r1, 1.27.6-r0",
"upstream": [
"GHSA-2GH3-RMM4-6RQ5",
"GHSA-R6V5-FH4H-64XC",
"GHSA-RHFX-M35P-FF5J",
"GHSA-XWFJ-JGWM-7WP5"
]
}
cleanstart-2026-kw90815
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.8-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KW90815",
"modified": "2026-03-25T05:02:40Z",
"published": "2026-04-01T09:22:32.438088Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KW90815.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-lk63891
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.29.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LK63891",
"modified": "2026-03-25T05:12:36Z",
"published": "2026-04-01T09:22:08.586608Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LK63891.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-nn87556
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.29.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NN87556",
"modified": "2026-02-18T09:40:19Z",
"published": "2026-02-19T00:39:07.788394Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NN87556"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-2GH3-RMM4-6RQ5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-434X-W66G-QW3R"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-R6V5-FH4H-64XC"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-XWFJ-JGWM-7WP5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.29.0-r0",
"upstream": [
"GHSA-2GH3-RMM4-6RQ5",
"GHSA-434X-W66G-QW3R",
"GHSA-R6V5-FH4H-64XC",
"GHSA-XWFJ-JGWM-7WP5"
]
}
cleanstart-2026-oj16660
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-OJ16660",
"modified": "2026-02-18T09:40:19Z",
"published": "2026-02-19T00:39:07.225007Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-OJ16660"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-2GH3-RMM4-6RQ5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-434X-W66G-QW3R"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-R6V5-FH4H-64XC"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-XWFJ-JGWM-7WP5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for GHSA-2GH3-RMM4-6RQ5, GHSA-434X-W66G-QW3R, GHSA-R6V5-FH4H-64XC, GHSA-XWFJ-JGWM-7WP5 applied in versions: 1.28.2-r0, 1.28.4-r0",
"upstream": [
"GHSA-2GH3-RMM4-6RQ5",
"GHSA-434X-W66G-QW3R",
"GHSA-R6V5-FH4H-64XC",
"GHSA-XWFJ-JGWM-7WP5"
]
}
rustsec-2026-0009
Vulnerability from osv_rustsec
Impact
When user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario.
Patches
A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Workarounds
Limiting the length of user input is the simplest way to avoid stack exhaustion, as the amount of the stack consumed would be at most a factor of the length of the input.
{
"affected": [
{
"database_specific": {
"categories": [
"denial-of-service"
],
"cvss": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [
"time::Date::parse",
"time::OffsetDateTime::parse",
"time::PrimitiveDateTime::parse",
"time::Time::parse",
"time::UtcDateTime::parse",
"time::UtcOffset::parse",
"time::parsing::Parsed::parse_item"
],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "time",
"purl": "pkg:cargo/time"
},
"ranges": [
{
"events": [
{
"introduced": "0.3.6"
},
{
"fixed": "0.3.47"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2026-25727",
"GHSA-r6v5-fh4h-64xc"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "## Impact\n\nWhen user-provided input is provided to any type that parses with the RFC 2822 format, a denial of\nservice attack via stack exhaustion is possible. The attack relies on formally deprecated and\nrarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary,\nnon-malicious input will never encounter this scenario.\n\n## Patches\n\nA limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned\nrather than exhausting the stack.\n\n## Workarounds\n\nLimiting the length of user input is the simplest way to avoid stack exhaustion, as the amount of\nthe stack consumed would be at most a factor of the length of the input.",
"id": "RUSTSEC-2026-0009",
"modified": "2026-02-06T09:12:16Z",
"published": "2026-02-05T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/time"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0009.html"
},
{
"type": "WEB",
"url": "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05"
}
],
"related": [],
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"type": "CVSS_V4"
}
],
"summary": "Denial of Service via Stack Exhaustion"
}
CVE-2026-25727 (GCVE-0-2026-25727)
Vulnerability from cvelistv5 – Published: 2026-02-06 19:20 – Updated: 2026-02-06 20:22- CWE-121 - Stack-based Buffer Overflow
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25727",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-06T20:22:34.026090Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-06T20:22:58.488Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "time",
"vendor": "time-rs",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.3.6, \u003c 0.3.47"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-06T19:20:56.298Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/time-rs/time/security/advisories/GHSA-r6v5-fh4h-64xc"
},
{
"name": "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee"
},
{
"name": "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/time-rs/time/blob/main/CHANGELOG.md#0347-2026-02-05"
},
{
"name": "https://github.com/time-rs/time/releases/tag/v0.3.47",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/time-rs/time/releases/tag/v0.3.47"
}
],
"source": {
"advisory": "GHSA-r6v5-fh4h-64xc",
"discovery": "UNKNOWN"
},
"title": "time affected by a stack exhaustion denial of service attack"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-25727",
"datePublished": "2026-02-06T19:20:56.298Z",
"dateReserved": "2026-02-05T16:48:00.426Z",
"dateUpdated": "2026-02-06T20:22:58.488Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.