A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:6986 | |
https://access.redhat.com/errata/RHSA-2024:9430 | |
https://access.redhat.com/security/cve/CVE-2024-5742 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2278574 | Issue Tracking Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2024-5742 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2278574 | Issue Tracking Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2024/06/msg00006.html |
Configurations
History
No history.
Information
Published : 2024-06-12 09:15
Updated : 2024-11-21 09:48
NVD link : CVE-2024-5742
Mitre link : CVE-2024-5742
CVE.ORG link : CVE-2024-5742
JSON object : View
Products Affected
gnu
- nano
redhat
- enterprise_linux
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')