GHSA-8RGQ-M2PM-JVMG
Vulnerability from github – Published: 2026-01-26 21:30 – Updated: 2026-01-26 21:30
VLAI?
Details
A flaw was found in gix-date. The gix_date::parse::TimeBuf::as_str function can generate strings containing invalid non-UTF8 characters. This issue violates the internal safety invariants of the TimeBuf component, leading to undefined behavior when these malformed strings are subsequently processed. This could potentially result in application instability or other unforeseen consequences.
Severity ?
6.8 (Medium)
{
"affected": [],
"aliases": [
"CVE-2026-0810"
],
"database_specific": {
"cwe_ids": [
"CWE-135"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-26T20:16:09Z",
"severity": "MODERATE"
},
"details": "A flaw was found in gix-date. The `gix_date::parse::TimeBuf::as_str` function can generate strings containing invalid non-UTF8 characters. This issue violates the internal safety invariants of the `TimeBuf` component, leading to undefined behavior when these malformed strings are subsequently processed. This could potentially result in application instability or other unforeseen consequences.",
"id": "GHSA-8rgq-m2pm-jvmg",
"modified": "2026-01-26T21:30:36Z",
"published": "2026-01-26T21:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0810"
},
{
"type": "WEB",
"url": "https://github.com/GitoxideLabs/gitoxide/issues/2305"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-0810"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427057"
},
{
"type": "WEB",
"url": "https://crates.io/crates/gix-date"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0140.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…