The obsolete nis_local_principal function in the GNU C Library version 2.43 and older may overflow a buffer in the data section, which could allow an attacker to spoof a crafted response to a UDP request generated by this function and overwrite neighboring static data in the requesting application.
NIS support is obsolete and has been deprecated in the GNU C Library since version 2.26 and is only maintained for legacy usage. Applications should port away from NIS to more modern identity and access management services.
NIS support is obsolete and has been deprecated in the GNU C Library since version 2.26 and is only maintained for legacy usage. Applications should port away from NIS to more modern identity and access management services.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://sourceware.org/bugzilla/show_bug.cgi?id=34067 |
|
History
Tue, 21 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
The Gnu C Library
The Gnu C Library glibc |
|
| Vendors & Products |
The Gnu C Library
The Gnu C Library glibc |
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The obsolete nis_local_principal function in the GNU C Library version 2.43 and older may overflow a buffer in the data section, which could allow an attacker to spoof a crafted response to a UDP request generated by this function and overwrite neighboring static data in the requesting application. NIS support is obsolete and has been deprecated in the GNU C Library since version 2.26 and is only maintained for legacy usage. Applications should port away from NIS to more modern identity and access management services. | |
| Title | Static buffer overflow in deprecated nis_local_principal | |
| Weaknesses | CWE-120 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-04-20T20:37:23.178Z
Reserved: 2026-04-01T17:07:51.437Z
Link: CVE-2026-5358
No data.
Status : Received
Published: 2026-04-20T21:16:36.713
Modified: 2026-04-20T21:16:36.713
Link: CVE-2026-5358
No data.
OpenCVE Enrichment
Updated: 2026-04-21T00:00:13Z
Weaknesses