| Name | CVE-2026-6842 |
| Description | A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| nano (PTS) | bullseye | 5.4-2+deb11u3 | vulnerable |
| bookworm | 7.2-1+deb12u1 | vulnerable | |
| trixie | 8.4-1 | vulnerable | |
| forky, sid | 9.0-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| nano | source | (unstable) | 9.0-1 |
[trixie] - nano <no-dsa> (Minor issue)
[bookworm] - nano <no-dsa> (Minor issue)
[bullseye] - nano <postponed> (Minor issue; can be fixed in next update)
https://bugzilla.redhat.com/show_bug.cgi?id=2460018
https://bugzilla.redhat.com/show_bug.cgi?id=2455314
Introduced with: https://cgit.git.savannah.gnu.org/cgit/nano.git/commit/?id=4200ed30036ead2bd6c10a39dbd5383f21124f5e (v2.9.1)
Fixed by: https://cgit.git.savannah.gnu.org/cgit/nano.git/commit/?id=cb43493e00e5777d2433ecf5db6402983b282d6f (v9.0)