|
|
Message-ID: <fbbaf5ed-23ad-4d45-92a6-1f620e422be4@linuxlounge.net> Date: Mon, 4 May 2026 23:26:38 +0200 From: Martin Weinelt <martin@...uxlounge.net> To: oss-security@...ts.openwall.com Subject: Nix/Lix: local privilege escalation in daemon process Nix is a package manager and build system for Unix-like systems. Lix is a community-maintained fork of Nix. Both provide a daemon used in multi-user installations to perform privileged build and store operations. The Nix and Lix projects are issuing a coordinated security advisory for vulnerabilities in their daemon implementations. A buffer overflow in the daemon may allow a local attacker with access to the daemon interface to achieve arbitrary code execution as the daemon user (root in typical multi-user installations). CVE assignment is pending. Fixes are available, and users are strongly encouraged to upgrade. For full details (affected versions, fixed releases, mitigations), see: https://discourse.nixos.org/t/security-advisory-local-privilege-escalation-in-lix-and-nix/77407 Martin
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.