CVE-2026-6843

NameCVE-2026-6843
DescriptionA flaw was found in nano. A local user could exploit a format string vulnerability in the `statusline()` function. By creating a directory with a name containing `printf` specifiers, the application attempts to display this name, leading to a segmentation fault (SEGV). This results in a Denial of Service (DoS) for the `nano` application.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nano (PTS)bullseye5.4-2+deb11u3vulnerable
bookworm7.2-1+deb12u1vulnerable
trixie8.4-1vulnerable
forky, sid9.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nanosource(unstable)9.0-1

Notes

[trixie] - nano <no-dsa> (Minor issue)
[bookworm] - nano <no-dsa> (Minor issue)
[bullseye] - nano <postponed> (Minor issue; can be fixed in next update)
https://bugzilla.redhat.com/show_bug.cgi?id=2460017
https://bugzilla.redhat.com/show_bug.cgi?id=2455127
Fixed by: https://cgit.git.savannah.gnu.org/cgit/nano.git/commit/?id=0b7328bce452bf1b0bbff81276425d4809a9b6fd (v9.0)

Search for package or bug name: Reporting problems