CVE-2026-5358
Buffer Overflow in GNU C Library nis_local_principal Function
Publication date: 2026-04-20
Last updated on: 2026-04-22
Assigner: GNU C Library
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gnu | gnu_c_library | to 2.26 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the obsolete nis_local_principal function of the GNU C Library version 2.43 and older. This function may overflow a buffer located in the data section. An attacker could exploit this by spoofing a crafted response to a UDP request generated by this function, which could then overwrite neighboring static data in the requesting application.
Since NIS support is obsolete and deprecated since version 2.26 of the GNU C Library, this vulnerability affects legacy systems still using NIS for identity and access management.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to overwrite static data in an application by sending a crafted UDP response. This could lead to unexpected behavior, potential application crashes, or exploitation of the application by manipulating its memory.
Because the vulnerability involves buffer overflow and data overwriting, it may be used to compromise the security or stability of applications relying on the vulnerable function.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to the obsolete nis_local_principal function in GNU C Library versions 2.43 and older. Since NIS support is deprecated and only maintained for legacy usage, the recommended mitigation is to port applications away from NIS to more modern identity and access management services.