CVE-2024-5742
Publication date 12 June 2024
Last updated 29 October 2024
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
Read the notes from the security team
Why is this CVE low priority?
Uncommon attack scenario
Status
Package | Ubuntu Release | Status |
---|---|---|
nano | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Fixed 7.2-2ubuntu0.1
|
|
22.04 LTS jammy |
Fixed 6.2-1ubuntu0.1
|
|
20.04 LTS focal |
Fixed 4.8-1ubuntu1.1
|
|
18.04 LTS bionic |
Fixed 2.9.3-2ubuntu0.1~esm1
|
|
16.04 LTS xenial |
Fixed 2.5.3-2ubuntu2+esm1
|
|
14.04 LTS trusty |
Fixed 2.2.6-1ubuntu1+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
mdeslaur
only an issue if nano is run by root, but an unprivileged user is able to kill it, an uncommon scenario
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.7 · Medium |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7064-1
- nano vulnerability
- 15 October 2024
- USN-7064-2
- nano vulnerability
- 29 October 2024