Dan Rosenberg reported  two vulnerabilities in GNU nano:
When editing a file that is owned by another user, the owner of the file could replace the file in mid-edit with a symbolic link, resulting in the editor overwriting the target of the symbolic link with the privileges of the user editing the file, without any warning to the editor. (CVE-2010-1160; fixed upstream in r4490)
When backup files are enabled, and root is editing a file owned by an untrusted user, that user could exploit race conditions in the creation of backup files to take ownership of arbitrary files. (CVE-2010-1161; fixed upstream in r4491, r4493, r4496)
Patches , ,  are available to correct both issues.
Created nano tracking bugs for this issue
Affects: fedora-all [bug 582739]
nano-2.0.9-6.fc12 has been submitted as an update for Fedora 12.
nano-2.0.9-1.fc11 has been submitted as an update for Fedora 11.
nano-2.2.4-1.fc13 has been submitted as an update for Fedora 13.
The Red Hat Security Response Team has rated these issues as having low security impact, a future update may address these flaws.
nano-2.2.4-1.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
nano-2.0.9-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
nano-2.0.9-6.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
RHEL6 and RHEL5 bugs have been closed with a fix. CVE database is not updated
Red Hat Enterprise Linux 6 had these issues corrected before its initial release. Therefore, there is no erratum to link from the CVE page.
Red Hat Enterprise Linux 5 hasn't got these issues corrected. As this is Low impact issue, and Red Hat Enterprise Linux 5 is already in the Phase 3 of its life cycle, these issues are not expected to get corrected.
This issue was corrected in Red Hat Enterprise Linux 6 prior to its initial release.
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates for this or earlier releases. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.