Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76821.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-76821
Upstream
Published
2026-02-06T20:16:11Z
Modified
2026-04-01T05:22:59.969807Z
Summary
CVE-2026-25727 affecting package azl-compliance for versions less than 1.0.2-3
Details

time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

References

Affected packages

Azure Linux:2 / azl-compliance

Package

Name
azl-compliance
Purl
pkg:rpm/azure-linux/azl-compliance

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2-3

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76821.json"