Описание
Security update for snpguest
This update for snpguest fixes the following issues:
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257927).
Список пакетов
SUSE Linux Enterprise Server 15 SP6-LTSS
snpguest-0.3.2-150600.3.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP6
snpguest-0.3.2-150600.3.9.1
openSUSE Leap 15.6
snpguest-0.3.2-150600.3.9.1
Ссылки
- Link for SUSE-SU-2026:0582-1
- E-Mail link for SUSE-SU-2026:0582-1
- SUSE Security Ratings
- SUSE Bug 1257927
- SUSE CVE CVE-2026-25727 page
Описание
time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Затронутые продукты
SUSE Linux Enterprise Server 15 SP6-LTSS:snpguest-0.3.2-150600.3.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP6:snpguest-0.3.2-150600.3.9.1
openSUSE Leap 15.6:snpguest-0.3.2-150600.3.9.1
Ссылки
- CVE-2026-25727
- SUSE Bug 1257901