{"id":"AZL-42619","summary":"CVE-2024-5742 affecting package nano for versions less than 6.0-3","details":"A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.","modified":"2026-04-01T05:14:47.282384Z","published":"2024-06-12T09:15:23Z","upstream":["CVE-2024-5742"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5742"}],"affected":[{"package":{"name":"nano","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/nano"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-42619.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}