No advisories yet.
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, applications utilizing `libucl` should avoid processing untrusted input that contains keys with embedded null bytes, especially when operating in `UCL_PARSER_ZEROCOPY` mode. Restricting input to trusted sources can reduce exposure.
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libucl
Libucl libucl |
|
| Vendors & Products |
Libucl
Libucl libucl |
Tue, 17 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system. | |
| Title | Libucl: libucl: denial of service via embedded null byte in ucl input | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-03-17T13:26:47.057Z
Reserved: 2026-01-08T03:31:35.226Z
Link: CVE-2026-0708
No data.
Status : Received
Published: 2026-03-17T04:16:07.750
Modified: 2026-03-17T04:16:07.750
Link: CVE-2026-0708
No data.
OpenCVE Enrichment
Updated: 2026-03-17T09:51:58Z