{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2026-44028","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","state":"PUBLISHED","assignerShortName":"mitre","dateReserved":"2026-05-05T00:29:44.087Z","datePublished":"2026-05-05T00:30:16.205Z","dateUpdated":"2026-05-09T03:40:06.637Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Nix","vendor":"NixOS","versions":[{"lessThan":"2.28.7","status":"affected","version":"2.24.4","versionType":"semver"},{"lessThan":"2.29.4","status":"affected","version":"2.29.0","versionType":"semver"},{"lessThan":"2.30.5","status":"affected","version":"2.30.0","versionType":"semver"},{"lessThan":"2.31.5","status":"affected","version":"2.31.0","versionType":"semver"},{"lessThan":"2.32.8","status":"affected","version":"2.32.0","versionType":"semver"},{"lessThan":"2.33.6","status":"affected","version":"2.33.0","versionType":"semver"},{"lessThan":"2.34.7","status":"affected","version":"2.34.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Lix","vendor":"Lix Project","versions":[{"lessThan":"2.93.4","status":"affected","version":"2.93.0","versionType":"semver"},{"lessThan":"2.94.2","status":"affected","version":"2.94.0","versionType":"semver"},{"lessThan":"2.95.2","status":"affected","version":"2.95.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Archive) parser could lead to a stack-to-heap overflow when the parser is run on a coroutine stack. The stack is allocated without a guard page, which means that a stack overflow could overwrite memory on the heap and could allow arbitrary code execution as the Nix daemon (run as root in multi-user installations) if ASLR hardening is bypassed. This can be exploited by all users able to connect to the daemon (e.g., in Nix, this is configurable via the allowed-users setting, defaulting to all users). The fixed versions are 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7 for Nix (introduced in 2.24.4); and 2.95.2, 2.94.2, and 2.93.4 for Lix (introduced in 2.93.0)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-674","description":"CWE-674 Uncontrolled Recursion","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2026-05-09T03:40:06.637Z"},"references":[{"url":"https://discourse.nixos.org/t/security-advisory-local-privilege-escalation-in-lix-and-nix/77407"},{"url":"https://github.com/NixOS/nix/security/advisories/GHSA-vh5x-56v6-4368"},{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/33"},{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/32"},{"url":"https://lix.systems/blog/2026-05-05-lix-unsigned-integer-overflow/"}],"x_generator":{"engine":"CVE-Request-form 0.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-05T14:03:11.111278Z","id":"CVE-2026-44028","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-05T14:13:37.898Z"}}]},"dataVersion":"5.2"}