A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:6986 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:9430 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-5742 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2278574 | vendor advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2024/06/msg00006.html |