Impact
The printenv utility in uutils coreutils fails to display environment variables that contain invalid UTF‑8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the implementation silently skips these entries rather than printing the raw data. This allows malicious environment variables—such as crafted LD_PRELOAD values—to evade detection by administrators or security‑auditing tools, potentially enabling library injection or other environment‑based attacks. The weakness is a classic example of improper encoding (CWE‑754).
Affected Systems
The vulnerability affects the Uutils coreutils package, specifically the printenv utility. No specific version was enumerated in the CNA data, but the fix was incorporated in the 0.6.0 release referenced in the advisory. Users of earlier releases are affected.
Risk and Exploitability
The CVSS score of 4.4 indicates a medium severity, and the EPSS entry is not available, suggesting no publicly reported exploitation yet. The vulnerability is not listed in CISA KEV. The likely attack vector is a local or privileged context where an attacker can inject environment variables that should otherwise be audited. By silently discarding ill‑formed entries, the system may allow injected variables to go undetected, leading to potential library injection or similar attacks. Exploitation requires the attacker to control or influence environment variables that the target process uses.
OpenCVE Enrichment
Github GHSA