CVE-2026-0708 PUBLISHED

Libucl: libucl: denial of service via embedded null byte in ucl input

Assigner: fedora
Reserved: 08.01.2026 Published: 17.03.2026 Updated: 17.03.2026

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the ucl_object_emit function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
CVSS Score: 8.3

Product Status

Vendor libucl
Product libucl
Versions Default: unknown
  • Version 3e7f023e184e06f30fb5792dacd9dd0f8b692f1b is affected

Workarounds

To mitigate this issue, applications utilizing libucl should avoid processing untrusted input that contains keys with embedded null bytes, especially when operating in UCL_PARSER_ZEROCOPY mode. Restricting input to trusted sources can reduce exposure.

References

Problem Types

  • Out-of-bounds Read CWE