CVE-2026-0810
low-risk
Published 2026-01-26
A flaw was found in gix-date. The `gix_date::parse::TimeBuf::as_str` function can generate strings containing invalid non-UTF8 characters. This issue violates the internal safety invariants of the `TimeBuf` component, leading to undefined behavior when these malformed strings are subsequently processed. This could potentially result in application instability or other unforeseen consequences.
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.1/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Gix-Date
Affected Vendors
References (6)
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2026-0810
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2427057
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2025-0140.html
27
/ 100
low-risk
Severity
22/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal