Debian Package Tracker
Register | Log in
Subscribe

rust-time

Utilities for working with time-related functions - Rust source code

Choose email to subscribe with

general
  • source: rust-time (main)
  • version: 0.3.47-1
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Wolfgang Silbermayr [DMD] [DM]
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.1.42-1
  • oldstable: 0.3.9-1
  • stable: 0.3.37-1
  • testing: 0.3.44-1
  • unstable: 0.3.47-1
versioned links
  • 0.1.42-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.9-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.37-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.44-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.47-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librust-time-dev
action needed
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-25727: time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Created: 2026-02-06 Last update: 2026-02-07 05:32
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-25727: time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
Created: 2026-02-06 Last update: 2026-02-07 05:32
12 open merge requests in Salsa normal
There are 12 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-02-06 16:02
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-25727: (needs triaging) time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-06 Last update: 2026-02-07 05:32
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-25727: (needs triaging) time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-02-06 Last update: 2026-02-07 05:32
debian/patches: 4 patches to forward upstream low

Among the 4 debian patches available in version 0.3.47-1 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-06 19:02
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-02-06 17:34
testing migrations
  • excuses:
    • Migrates after: rust-num-conv, rust-time-core, rust-time-macros
    • Migration status for rust-time (0.3.44-1 to 0.3.47-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for rust-cargo: amd64: Test triggered (failure will be ignored), arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for rust-prodash/28.0.0-5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for rust-pyo3/0.27.2-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Failed (not a regression) ♻ (reference ♻), riscv64: Test triggered (failure will be ignored), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for rust-ruma-common/0.14.1+ds-7: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Regression ♻ (reference ♻), s390x: Test triggered
    • ∙ ∙ Autopkgtest for rust-sqlx-core/0.8.3-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for rust-time/0.3.47-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for rust-zxcvbn/3.1.0-1: riscv64: Regression ♻ (reference ♻)
    • ∙ ∙ Too young, only 1 of 5 days old
    • ∙ ∙ Build-Depends(-Arch): rust-time rust-num-conv
    • ∙ ∙ Build-Depends(-Arch): rust-time rust-time-core
    • ∙ ∙ Depends: rust-time rust-num-conv
    • ∙ ∙ Depends: rust-time rust-time-core
    • ∙ ∙ Depends: rust-time rust-time-macros
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/r/rust-time.html
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ Reproducible on arm64
    • ∙ ∙ Reproducible on armhf
    • ∙ ∙ Reproducible on i386
    • ∙ ∙ Reproducible on ppc64el
    • Not considered
news
[rss feed]
  • [2026-02-06] Accepted rust-time 0.3.47-1 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2026-01-06] rust-time 0.3.44-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-02] Accepted rust-time 0.3.44-1 (source) into unstable (Peter Michael Green)
  • [2025-08-23] rust-time 0.3.39-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-20] Accepted rust-time 0.3.39-1 (source) into unstable (Colin Watson)
  • [2024-12-31] rust-time 0.3.37-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-28] Accepted rust-time 0.3.37-1 (source) into unstable (Blair Noctis)
  • [2024-10-04] rust-time 0.3.36-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-24] Accepted rust-time 0.3.36-2 (source) into unstable (Peter Michael Green)
  • [2024-09-23] Accepted rust-time 0.3.36-1 (source) into unstable (Matthias Geiger)
  • [2024-08-08] rust-time 0.3.31-2 MIGRATED to testing (Debian testing watch)
  • [2024-07-31] Accepted rust-time 0.3.31-2 (source) into unstable (Fabian Grünbichler) (signed by: Fabian Gruenbichler)
  • [2024-02-21] rust-time 0.3.31-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-18] Accepted rust-time 0.3.31-1 (source) into unstable (Peter Michael Green)
  • [2023-08-13] rust-time 0.3.23-2 MIGRATED to testing (Debian testing watch)
  • [2023-08-03] Accepted rust-time 0.3.23-2 (source) into unstable (Peter Michael Green)
  • [2023-08-01] Accepted rust-time 0.3.23-1 (source) into unstable (Peter Michael Green)
  • [2022-06-13] rust-time 0.3.9-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-07] Accepted rust-time 0.3.9-1 (source) into unstable (Sylvestre Ledru)
  • [2022-05-06] rust-time 0.3.5-4 MIGRATED to testing (Debian testing watch)
  • [2022-05-02] Accepted rust-time 0.3.5-4 (source) into unstable (Peter Michael Green)
  • [2022-02-10] rust-time 0.3.5-3 MIGRATED to testing (Debian testing watch)
  • [2022-02-05] Accepted rust-time 0.3.5-3 (source) into unstable (Peter Michael Green)
  • [2021-12-31] rust-time 0.3.5-2 MIGRATED to testing (Debian testing watch)
  • [2021-12-22] Accepted rust-time 0.3.5-2 (source) into unstable (Peter Michael Green)
  • [2021-12-18] Accepted rust-time 0.3.5-1 (source) into unstable (Sylvestre Ledru)
  • [2020-04-15] rust-time 0.1.42-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-25] rust-time REMOVED from testing (Debian testing watch)
  • [2019-01-26] rust-time 0.1.42-1 MIGRATED to testing (Debian testing watch)
  • [2019-01-21] Accepted rust-time 0.1.42-1 (source) into unstable (Wolfgang Silbermayr)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.3.44-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing