CVE-2026-0708

high

Description

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

References

https://github.com/vstakhov/libucl/issues/323

https://bugzilla.redhat.com/show_bug.cgi?id=2427770

https://access.redhat.com/security/cve/CVE-2026-0708

Details

Source: Mitre, NVD

Published: 2026-03-17

Updated: 2026-03-17

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 8.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H

Severity: High