Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Python Maturin Date Parsing Error Allows Remote Code Execution
SUSE-SU-2026:0860-1
Summary
A security update for Python Maturin fixes a bug that allows hackers to crash the system by submitting a specially crafted date. This could potentially be used to take control of the system. Update Python Maturin to the latest version to fix this issue.
What to do
- Update python-maturin to version 1.4.0-150600.3.12.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | python-maturin | <= 1.4.0-150600.3.12.1 | 1.4.0-150600.3.12.1 |
Original title
Security update for python-maturin
Original description
This update for python-maturin fixes the following issue:
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
(bsc#1257918).
- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
(bsc#1257918).
- https://www.suse.com/support/update/announcement/2026/suse-su-20260860-1/ Vendor Advisory
- https://bugzilla.suse.com/1257918 Third Party Advisory
- https://www.suse.com/security/cve/CVE-2026-25727 URL
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 13 Mar 2026