Impact
The printenv utility in uutils coreutils fails to display environment variables that contain invalid UTF-8 byte sequences. While POSIX allows arbitrary bytes in environment strings, the implementation silently skips entries rather than printing the raw data. This creates a scenario where malicious environment variables—such as crafted LD_PRELOAD values—can avoid administrator or audit detection, potentially enabling library injection or other environment‑based attacks. The weakness is a classic example of CWE‑754, improper encoding.
Affected Systems
The vulnerability affects the Uutils coreutils package, specifically the printenv utility. No specific version was enumerated in the CNA data, but the fix was incorporated in the 0.6.0 release referenced in the advisory. Users of earlier releases are affected.
Risk and Exploitability
The CVSS score of 4.4 indicates a medium severity, and the EPSS entry is not available, suggesting no publicly reported exploitation yet. The vulnerability is not listed in CISA KEV. Based on the description, the likely attack vector is a local or privileged context where an adversary can inject environment variables that the system should audit. With the current implementation silently discarding ill‑formed entries, such injected variables could go undetected, leading to potential library injection or similar attacks. Note that the exploitation requires the attacker to control or influence environment variables that the target process uses.
OpenCVE Enrichment