CVE-2026-5358
Summary
| CVE | CVE-2026-5358 |
|---|---|
| State | REJECTED |
| Assigner | glibc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-20 21:16:36 UTC |
| Updated | 2026-04-22 14:17:05 UTC |
| Description | Rejected reason: REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug. |
Risk And Classification
EPSS: 0.000400000 probability, percentile 0.121830000 (date 2026-04-22)
There are no known software configurations currently associated with this CVE in NVD or the CVE Program record.
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sourceware.org/bugzilla/show_bug.cgi | MITRE | sourceware.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.