{"api_version":"1","generated_at":"2026-05-05T12:40:07+00:00","cve":"CVE-2026-44028","urls":{"html":"https://cve.report/CVE-2026-44028","api":"https://cve.report/api/cve/CVE-2026-44028.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-44028","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-44028"},"summary":{"title":"CVE-2026-44028","description":"An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Archive) parser could lead to a stack-to-heap overflow when the parser is run on a coroutine stack. The stack is allocated without a guard page, which means that a stack overflow could overwrite memory on the heap and could allow arbitrary code execution as the Nix daemon (run as root in multi-user installations) if ASLR hardening is bypassed. This can be exploited by all users able to connect to the daemon (e.g., in Nix, this is configurable via the allowed-users setting, defaulting to all users). The fixed versions are 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7 for Nix (introduced in 2.24.4); and 2.95.2, 2.94.2, and 2.93.4 for Lix (introduced in 2.93.0).","state":"PUBLISHED","assigner":"mitre","published_at":"2026-05-05 01:16:06","updated_at":"2026-05-05 01:16:06"},"problem_types":["CWE-674","CWE-674 CWE-674 Uncontrolled Recursion"],"metrics":[{"version":"3.1","source":"cve@mitre.org","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","data":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/32","name":"https://www.openwall.com/lists/oss-security/2026/05/04/32","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://discourse.nixos.org/t/security-advisory-local-privilege-escalation-in-lix-and-nix/77407","name":"https://discourse.nixos.org/t/security-advisory-local-privilege-escalation-in-lix-and-nix/77407","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/33","name":"https://www.openwall.com/lists/oss-security/2026/05/04/33","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/NixOS/nix/security/advisories/GHSA-vh5x-56v6-4368","name":"https://github.com/NixOS/nix/security/advisories/GHSA-vh5x-56v6-4368","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-44028","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44028","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.24.4 2.28.7 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.29.0 2.29.4 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.30.0 2.30.5 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.31.0 2.31.5 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.32.0 2.32.8 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.33.0 2.33.6 semver","platforms":[]},{"source":"CNA","vendor":"NixOS","product":"Nix","version":"affected 2.34.0 2.34.7 semver","platforms":[]},{"source":"CNA","vendor":"Lix Project","product":"Lix","version":"affected 2.93.0 2.93.4 semver","platforms":[]},{"source":"CNA","vendor":"Lix Project","product":"Lix","version":"affected 2.94.0 2.94.2 semver","platforms":[]},{"source":"CNA","vendor":"Lix Project","product":"Lix","version":"affected 2.95.0 2.95.2 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Nix","vendor":"NixOS","versions":[{"lessThan":"2.28.7","status":"affected","version":"2.24.4","versionType":"semver"},{"lessThan":"2.29.4","status":"affected","version":"2.29.0","versionType":"semver"},{"lessThan":"2.30.5","status":"affected","version":"2.30.0","versionType":"semver"},{"lessThan":"2.31.5","status":"affected","version":"2.31.0","versionType":"semver"},{"lessThan":"2.32.8","status":"affected","version":"2.32.0","versionType":"semver"},{"lessThan":"2.33.6","status":"affected","version":"2.33.0","versionType":"semver"},{"lessThan":"2.34.7","status":"affected","version":"2.34.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Lix","vendor":"Lix Project","versions":[{"lessThan":"2.93.4","status":"affected","version":"2.93.0","versionType":"semver"},{"lessThan":"2.94.2","status":"affected","version":"2.94.0","versionType":"semver"},{"lessThan":"2.95.2","status":"affected","version":"2.95.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Archive) parser could lead to a stack-to-heap overflow when the parser is run on a coroutine stack. The stack is allocated without a guard page, which means that a stack overflow could overwrite memory on the heap and could allow arbitrary code execution as the Nix daemon (run as root in multi-user installations) if ASLR hardening is bypassed. This can be exploited by all users able to connect to the daemon (e.g., in Nix, this is configurable via the allowed-users setting, defaulting to all users). The fixed versions are 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7 for Nix (introduced in 2.24.4); and 2.95.2, 2.94.2, and 2.93.4 for Lix (introduced in 2.93.0)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-674","description":"CWE-674 Uncontrolled Recursion","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-05T00:37:42.535Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"url":"https://discourse.nixos.org/t/security-advisory-local-privilege-escalation-in-lix-and-nix/77407"},{"url":"https://github.com/NixOS/nix/security/advisories/GHSA-vh5x-56v6-4368"},{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/33"},{"url":"https://www.openwall.com/lists/oss-security/2026/05/04/32"}],"x_generator":{"engine":"CVE-Request-form 0.0.1"}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2026-44028","datePublished":"2026-05-05T00:30:16.205Z","dateReserved":"2026-05-05T00:29:44.087Z","dateUpdated":"2026-05-05T00:37:42.535Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-05 01:16:06","lastModifiedDate":"2026-05-05 01:16:06","problem_types":["CWE-674","CWE-674 CWE-674 Uncontrolled Recursion"],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.1,"impactScore":5.8}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"44028","Ordinal":"1","Title":"CVE-2026-44028","CVE":"CVE-2026-44028","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"44028","Ordinal":"1","NoteData":"An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Archive) parser could lead to a stack-to-heap overflow when the parser is run on a coroutine stack. The stack is allocated without a guard page, which means that a stack overflow could overwrite memory on the heap and could allow arbitrary code execution as the Nix daemon (run as root in multi-user installations) if ASLR hardening is bypassed. This can be exploited by all users able to connect to the daemon (e.g., in Nix, this is configurable via the allowed-users setting, defaulting to all users). The fixed versions are 2.34.7, 2.33.6, 2.32.8, 2.31.5, 2.30.5, 2.29.4, and 2.28.7 for Nix (introduced in 2.24.4); and 2.95.2, 2.94.2, and 2.93.4 for Lix (introduced in 2.93.0).","Type":"Description","Title":"CVE-2026-44028"}]}}}