Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 05 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lix Project
Lix Project lix Nixos Nixos nix |
|
| Vendors & Products |
Lix Project
Lix Project lix Nixos Nixos nix |
Tue, 05 May 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack-to-Heap Overflow in Nix Archive Parser Allows Privilege Escalation and Arbitrary Code Execution |
Tue, 05 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Archive) parser could lead to a stack-to-heap overflow when the parser is run on a coroutine stack. The stack is allocated without a guard page, which means that a stack overflow could overwrite memory on the heap and could allow arbitrary code execution as the Nix daemon (run as root in multi-user installations) if ASLR hardening is bypassed. This can be exploited by all users able to connect to the daemon (e.g., in Nix, this is configurable via the allowed-users setting, defaulting to all users). The fixed versions are 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7 for Nix (introduced in 2.24.4); and 2.95.2, 2.94.2, and 2.93.4 for Lix (introduced in 2.93.0). | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-09T03:40:06.637Z
Reserved: 2026-05-05T00:29:44.087Z
Link: CVE-2026-44028
Updated: 2026-05-05T14:03:16.081Z
Status : Deferred
Published: 2026-05-05T01:16:06.983
Modified: 2026-05-09T04:16:26.513
Link: CVE-2026-44028
No data.
OpenCVE Enrichment
Updated: 2026-05-05T04:00:11Z