CVE-2026-5358 (GCVE-0-2026-5358)
Vulnerability from cvelistv5 – Published: 2026-04-20 20:37 – Updated: 2026-04-22 13:04
VLAI?
REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2026-04-22T13:04:20.656Z",
"orgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"shortName": "glibc"
},
"rejectedReasons": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\u003cspan\u003eREJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u0026nbsp;\u003c/span\u003e\u003cspan\u003ediscovered that no NIS+ client or server was ever released for any\u0026nbsp;\u003c/span\u003e\u003cspan\u003eLinux-based OS distributions and as such this makes the API provisional\u0026nbsp;\u003c/span\u003e\u003cspan\u003eand unused. Secondly it has been discovered that the NIS+ cold start\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecan only be called with a trusted server from the pre-populated cache.\u0026nbsp;\u003c/span\u003e\u003cspan\u003eThe use of a trusted server means no trust boundary is crossed and this\u0026nbsp;\u003c/span\u003e\u003cspan\u003eis therefore considered a normal bug.\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e"
}
],
"value": "REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u00a0discovered that no NIS+ client or server was ever released for any\u00a0Linux-based OS distributions and as such this makes the API provisional\u00a0and unused. Secondly it has been discovered that the NIS+ cold start\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u00a0can only be called with a trusted server from the pre-populated cache.\u00a0The use of a trusted server means no trust boundary is crossed and this\u00a0is therefore considered a normal bug."
}
],
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"assignerShortName": "glibc",
"cveId": "CVE-2026-5358",
"datePublished": "2026-04-20T20:37:23.178Z",
"dateRejected": "2026-04-22T13:04:20.656Z",
"dateReserved": "2026-04-01T17:07:51.437Z",
"dateUpdated": "2026-04-22T13:04:20.656Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-5358",
"date": "2026-04-22",
"epss": "0.0004",
"percentile": "0.12183"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-5358\",\"sourceIdentifier\":\"3ff69d7a-14f2-4f67-a097-88dee7810d18\",\"published\":\"2026-04-20T21:16:36.713\",\"lastModified\":\"2026-04-22T14:17:05.687\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u00a0discovered that no NIS+ client or server was ever released for any\u00a0Linux-based OS distributions and as such this makes the API provisional\u00a0and unused. Secondly it has been discovered that the NIS+ cold start\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u00a0can only be called with a trusted server from the pre-populated cache.\u00a0The use of a trusted server means no trust boundary is crossed and this\u00a0is therefore considered a normal bug.\"}],\"metrics\":{},\"references\":[]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"shortName\": \"glibc\", \"dateUpdated\": \"2026-04-22T13:04:20.656Z\"}, \"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\\u00a0discovered that no NIS+ client or server was ever released for any\\u00a0Linux-based OS distributions and as such this makes the API provisional\\u00a0and unused. Secondly it has been discovered that the NIS+ cold start\\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\\u00a0can only be called with a trusted server from the pre-populated cache.\\u00a0The use of a trusted server means no trust boundary is crossed and this\\u00a0is therefore considered a normal bug.\", \"supportingMedia\": [{\"type\": \"text/html\", \"base64\": false, \"value\": \"\u003cdiv\u003e\u003cspan\u003eREJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u0026nbsp;\u003c/span\u003e\u003cspan\u003ediscovered that no NIS+ client or server was ever released for any\u0026nbsp;\u003c/span\u003e\u003cspan\u003eLinux-based OS distributions and as such this makes the API provisional\u0026nbsp;\u003c/span\u003e\u003cspan\u003eand unused. Secondly it has been discovered that the NIS+ cold start\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecan only be called with a trusted server from the pre-populated cache.\u0026nbsp;\u003c/span\u003e\u003cspan\u003eThe use of a trusted server means no trust boundary is crossed and this\u0026nbsp;\u003c/span\u003e\u003cspan\u003eis therefore considered a normal bug.\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\"}]}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-5358\", \"assignerOrgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"state\": \"REJECTED\", \"assignerShortName\": \"glibc\", \"dateReserved\": \"2026-04-01T17:07:51.437Z\", \"datePublished\": \"2026-04-20T20:37:23.178Z\", \"dateUpdated\": \"2026-04-22T13:04:20.656Z\", \"dateRejected\": \"2026-04-22T13:04:20.656Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…