Description
A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.
Problem types
Product status
3e7f023e184e06f30fb5792dacd9dd0f8b692f1b (git)
Timeline
| 2026-01-08: | Reported to Red Hat. |
| 2025-05-15: | Made public. |
References
github.com/vstakhov/libucl/issues/323
access.redhat.com/security/cve/CVE-2026-0708
bugzilla.redhat.com/show_bug.cgi?id=2427770 (RHBZ#2427770)
github.com/vstakhov/libucl/issues/323