NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-39860
Summary

Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user installations) by following symlinks during fixed-output derivation output registration. This affects sandboxed Linux builds - sandboxed macOS builds are unaffected. The location of the temporary output used for the output copy was located inside the build chroot. A symlink, pointing to an arbitrary location in the filesystem, could be created by the derivation builder at that path. During output registration, the Nix process (running in the host mount namespace) would follow that symlink and overwrite the destination with the derivation's output contents. In multi-user installations, this allows all users able to submit builds to the Nix daemon (allowed-users - defaulting to all users) to gain root privileges by modifying sensitive files. This vulnerability is fixed in 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, and 2.28.6.

Publication Date April 9, 2026, 6:17 a.m.
Registration Date April 15, 2026, 11:32 a.m.
Last Update April 16, 2026, 1:12 a.m.
CVSS3.1 : HIGH
スコア 8.4
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更あり
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.18.2 2.18.9
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.19.4 2.19.7
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.20.5 2.20.9
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.21.0 2.28.6
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.29.0 2.29.3
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.30.0 2.30.4
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.31.0 2.31.4
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.32.0 2.32.7
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.33.0 2.33.4
cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:* 2.34.0 2.34.5
Configuration2 or higher or less more than less than
Related information, measures and tools
Common Vulnerabilities List