A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Ensure that the system's umask is configured to a secure value, such as `0022` or `0077`, to prevent the creation of world-writable directories. This can be set system-wide in `/etc/profile` or `/etc/bashrc`, or for individual users in their `~/.bashrc` or `~/.profile`. A secure umask will ensure that newly created directories, including `~/.local` by `nano`, have appropriate permissions.

History

Wed, 22 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
Vendors & Products Redhat openshift Container Platform
References
Metrics threat_severity

None

threat_severity

Low


Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed.
Title Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-732
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-22T13:07:57.497Z

Reserved: 2026-04-22T07:20:17.989Z

Link: CVE-2026-6842

cve-icon Vulnrichment

Updated: 2026-04-22T13:07:54.134Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T08:16:13.170

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-6842

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-13T00:00:00Z

Links: CVE-2026-6842 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:44:31Z

Weaknesses