Home

Description

The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-22 | Updated 2026-04-22 | Assigner canonical




MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-754: Improper Check for Unusual or Exceptional Conditions

Product status

Default status
unaffected

Any version before 0.6.0
affected

Credits

Zellic finder

References

github.com/uutils/coreutils/issues/9701 exploit

github.com/uutils/coreutils/issues/9701 issue-tracking

github.com/uutils/coreutils/pull/9728 patch

github.com/uutils/coreutils/releases/tag/0.6.0 vendor-advisory

cve.org (CVE-2026-35366)

nvd.nist.gov (CVE-2026-35366)

Download JSON