Description
The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.
Published: 2026-04-22
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypassing Security Inspection
Action: Update
AI Analysis

Impact

The printenv utility in uutils coreutils fails to display environment variables that contain invalid UTF-8 byte sequences. While POSIX allows arbitrary bytes in environment strings, the implementation silently skips entries rather than printing the raw data. This creates a scenario where malicious environment variables—such as crafted LD_PRELOAD values—can avoid administrator or audit detection, potentially enabling library injection or other environment‑based attacks. The weakness is a classic example of CWE‑754, improper encoding.

Affected Systems

The vulnerability affects the Uutils coreutils package, specifically the printenv utility. No specific version was enumerated in the CNA data, but the fix was incorporated in the 0.6.0 release referenced in the advisory. Users of earlier releases are affected.

Risk and Exploitability

The CVSS score of 4.4 indicates a medium severity, and the EPSS entry is not available, suggesting no publicly reported exploitation yet. The vulnerability is not listed in CISA KEV. Based on the description, the likely attack vector is a local or privileged context where an adversary can inject environment variables that the system should audit. With the current implementation silently discarding ill‑formed entries, such injected variables could go undetected, leading to potential library injection or similar attacks. Note that the exploitation requires the attacker to control or influence environment variables that the target process uses.

Generated by OpenCVE AI on April 22, 2026 at 18:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade uutils coreutils to version 0.6.0 or later to include the printenv fix
  • Configure auditing or monitoring tools to flag environment variables that contain invalid UTF‑8 or enforce strict encoding checks
  • Limit or sanitize the usage of environment variables such as LD_PRELOAD in high‑risk deployment scenarios

Generated by OpenCVE AI on April 22, 2026 at 18:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.
Title uutils coreutils printenv Security Inspection Bypass via UTF-8 Enforcement
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-22T17:50:09.879Z

Reserved: 2026-04-02T12:58:56.088Z

Link: CVE-2026-35366

cve-icon Vulnrichment

Updated: 2026-04-22T17:49:59.355Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T17:16:40.167

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-35366

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:15:15Z

Weaknesses