Description
The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.
Published: 2026-04-22
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypassing Security Inspection
Action: Update
AI Analysis

Impact

The printenv utility in uutils coreutils fails to display environment variables that contain invalid UTF‑8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the implementation silently skips these entries rather than printing the raw data. This allows malicious environment variables—such as crafted LD_PRELOAD values—to evade detection by administrators or security‑auditing tools, potentially enabling library injection or other environment‑based attacks. The weakness is a classic example of improper encoding (CWE‑754).

Affected Systems

The vulnerability affects the Uutils coreutils package, specifically the printenv utility. No specific version was enumerated in the CNA data, but the fix was incorporated in the 0.6.0 release referenced in the advisory. Users of earlier releases are affected.

Risk and Exploitability

The CVSS score of 4.4 indicates a medium severity, and the EPSS entry is not available, suggesting no publicly reported exploitation yet. The vulnerability is not listed in CISA KEV. The likely attack vector is a local or privileged context where an attacker can inject environment variables that should otherwise be audited. By silently discarding ill‑formed entries, the system may allow injected variables to go undetected, leading to potential library injection or similar attacks. Exploitation requires the attacker to control or influence environment variables that the target process uses.

Generated by OpenCVE AI on April 27, 2026 at 08:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade uutils coreutils to version 0.6.0 or later to include the printenv fix
  • Configure auditing or monitoring tools to flag environment variables that contain invalid UTF‑8 or enforce strict encoding checks
  • Limit or sanitize the usage of environment variables such as LD_PRELOAD in high‑risk deployment scenarios

Generated by OpenCVE AI on April 27, 2026 at 08:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7259-cwhx-3xx3 uutils coreutils has an Improper Check for Unusual or Exceptional Conditions
History

Mon, 04 May 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:uutils:coreutils:*:*:*:*:*:rust:*:*

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Uutils
Uutils coreutils
Vendors & Products Uutils
Uutils coreutils

Wed, 22 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.
Title uutils coreutils printenv Security Inspection Bypass via UTF-8 Enforcement
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Uutils Coreutils
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-22T17:50:09.879Z

Reserved: 2026-04-02T12:58:56.088Z

Link: CVE-2026-35366

cve-icon Vulnrichment

Updated: 2026-04-22T17:49:59.355Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T17:16:40.167

Modified: 2026-05-04T18:52:42.390

Link: CVE-2026-35366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T19:53:40Z

Weaknesses