A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Openshift Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Ensure that the system's umask is configured to a secure value, such as `0022` or `0077`, to prevent the creation of world-writable directories. This can be set system-wide in `/etc/profile` or `/etc/bashrc`, or for individual users in their `~/.bashrc` or `~/.profile`. A secure umask will ensure that newly created directories, including `~/.local` by `nano`, have appropriate permissions.

History

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed.
Title Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-732
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-22T07:36:47.825Z

Reserved: 2026-04-22T07:20:17.989Z

Link: CVE-2026-6842

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T08:16:13.170

Modified: 2026-04-22T08:16:13.170

Link: CVE-2026-6842

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses