High severity8.3NVD Advisory· Published Mar 17, 2026· Updated May 11, 2026
CVE-2026-0708
CVE-2026-0708
Description
A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the ucl_object_emit function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- access.redhat.com/security/cve/CVE-2026-0708nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdThird Party AdvisoryIssue Tracking
- github.com/vstakhov/libucl/issues/323nvdIssue TrackingVendor AdvisoryExploit
News mentions
0No linked articles in our index yet.