Home

Description

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

PUBLISHED Reserved 2026-01-08 | Published 2026-03-17 | Updated 2026-03-17 | Assigner fedora




HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H

Problem types

Out-of-bounds Read

Product status

Default status
unknown

3e7f023e184e06f30fb5792dacd9dd0f8b692f1b (git)
affected

Timeline

2026-01-08:Reported to Red Hat.
2025-05-15:Made public.

References

github.com/vstakhov/libucl/issues/323 exploit

access.redhat.com/security/cve/CVE-2026-0708 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2427770 (RHBZ#2427770) issue-tracking

github.com/vstakhov/libucl/issues/323

cve.org (CVE-2026-0708)

nvd.nist.gov (CVE-2026-0708)

Download JSON