nano: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201006-08 / nano
||June 01, 2010
||June 01, 2010: 01
All supported architectures
Race conditions when editing files could lead to symlink attacks or changes
of ownerships of important files.
nano is a GNU GPL'd Pico clone with more functionality.
Multiple race condition vulnerabilities have been discovered in nano.
For further information please consult the CVE entries referenced
Under certain conditions, a local, user-assisted attacker could
possibly overwrite arbitrary files via a symlink attack on an
attacker-owned file that is being edited by the victim, or change the
ownership of arbitrary files.
There is no known workaround at this time.
All nano users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/nano-2.2.4"