A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, applications utilizing `libucl` should avoid processing untrusted input that contains keys with embedded null bytes, especially when operating in `UCL_PARSER_ZEROCOPY` mode. Restricting input to trusted sources can reduce exposure.

History

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Libucl
Libucl libucl
Vendors & Products Libucl
Libucl libucl

Tue, 17 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.
Title Libucl: libucl: denial of service via embedded null byte in ucl input
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2026-03-17T13:26:47.057Z

Reserved: 2026-01-08T03:31:35.226Z

Link: CVE-2026-0708

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-17T04:16:07.750

Modified: 2026-03-17T04:16:07.750

Link: CVE-2026-0708

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-17T09:51:58Z

Weaknesses