CVE-2026-5358 (GCVE-0-2026-5358)

Vulnerability from cvelistv5 – Published: 2026-04-20 20:37 – Updated: 2026-04-22 13:04
VLAI?

REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2026-04-22T13:04:20.656Z",
        "orgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
        "shortName": "glibc"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cspan\u003eREJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u0026nbsp;\u003c/span\u003e\u003cspan\u003ediscovered that no NIS+ client or server was ever released for any\u0026nbsp;\u003c/span\u003e\u003cspan\u003eLinux-based OS distributions and as such this makes the API provisional\u0026nbsp;\u003c/span\u003e\u003cspan\u003eand unused.  Secondly it has been discovered that the NIS+ cold start\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecan only be called with a trusted server from the pre-populated cache.\u0026nbsp;\u003c/span\u003e\u003cspan\u003eThe use of a trusted server means no trust boundary is crossed and this\u0026nbsp;\u003c/span\u003e\u003cspan\u003eis therefore considered a normal bug.\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e"
            }
          ],
          "value": "REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u00a0discovered that no NIS+ client or server was ever released for any\u00a0Linux-based OS distributions and as such this makes the API provisional\u00a0and unused.  Secondly it has been discovered that the NIS+ cold start\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u00a0can only be called with a trusted server from the pre-populated cache.\u00a0The use of a trusted server means no trust boundary is crossed and this\u00a0is therefore considered a normal bug."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 1.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
    "assignerShortName": "glibc",
    "cveId": "CVE-2026-5358",
    "datePublished": "2026-04-20T20:37:23.178Z",
    "dateRejected": "2026-04-22T13:04:20.656Z",
    "dateReserved": "2026-04-01T17:07:51.437Z",
    "dateUpdated": "2026-04-22T13:04:20.656Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-5358",
      "date": "2026-04-22",
      "epss": "0.0004",
      "percentile": "0.12183"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-5358\",\"sourceIdentifier\":\"3ff69d7a-14f2-4f67-a097-88dee7810d18\",\"published\":\"2026-04-20T21:16:36.713\",\"lastModified\":\"2026-04-22T14:17:05.687\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u00a0discovered that no NIS+ client or server was ever released for any\u00a0Linux-based OS distributions and as such this makes the API provisional\u00a0and unused.  Secondly it has been discovered that the NIS+ cold start\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u00a0can only be called with a trusted server from the pre-populated cache.\u00a0The use of a trusted server means no trust boundary is crossed and this\u00a0is therefore considered a normal bug.\"}],\"metrics\":{},\"references\":[]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"shortName\": \"glibc\", \"dateUpdated\": \"2026-04-22T13:04:20.656Z\"}, \"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\\u00a0discovered that no NIS+ client or server was ever released for any\\u00a0Linux-based OS distributions and as such this makes the API provisional\\u00a0and unused.  Secondly it has been discovered that the NIS+ cold start\\u00a0cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\\u00a0can only be called with a trusted server from the pre-populated cache.\\u00a0The use of a trusted server means no trust boundary is crossed and this\\u00a0is therefore considered a normal bug.\", \"supportingMedia\": [{\"type\": \"text/html\", \"base64\": false, \"value\": \"\u003cdiv\u003e\u003cspan\u003eREJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been\u0026nbsp;\u003c/span\u003e\u003cspan\u003ediscovered that no NIS+ client or server was ever released for any\u0026nbsp;\u003c/span\u003e\u003cspan\u003eLinux-based OS distributions and as such this makes the API provisional\u0026nbsp;\u003c/span\u003e\u003cspan\u003eand unused.  Secondly it has been discovered that the NIS+ cold start\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API\u0026nbsp;\u003c/span\u003e\u003cspan\u003ecan only be called with a trusted server from the pre-populated cache.\u0026nbsp;\u003c/span\u003e\u003cspan\u003eThe use of a trusted server means no trust boundary is crossed and this\u0026nbsp;\u003c/span\u003e\u003cspan\u003eis therefore considered a normal bug.\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c/span\u003e\u003c/div\u003e\"}]}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-5358\", \"assignerOrgId\": \"3ff69d7a-14f2-4f67-a097-88dee7810d18\", \"state\": \"REJECTED\", \"assignerShortName\": \"glibc\", \"dateReserved\": \"2026-04-01T17:07:51.437Z\", \"datePublished\": \"2026-04-20T20:37:23.178Z\", \"dateUpdated\": \"2026-04-22T13:04:20.656Z\", \"dateRejected\": \"2026-04-22T13:04:20.656Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…