CVE-2020-36657
NixOS vulnerability analysis and mitigation

Overview

CVE-2020-36657 affects uptimed versions before 0.4.6-r1 on Gentoo Linux. The vulnerability was discovered in January 2023 and allows local users with access to the uptimed user account to gain root privileges. The issue stems from an unsafe chown -R call within the /var/spool/uptimed directory (GENTOO GLSA).

Technical details

The vulnerability exists in the pkg_postinst ebuild phase where unnecessary file ownership modifications are performed. The issue allows the uptimed user to change arbitrary files to be owned by the uptimed user at emerge-time through the creation of hard links within the /var/spool/uptimed directory. This occurs due to an unsafe chown -R call that follows both symlinks and hardlinks by default (Gentoo Bug).

Impact

The vulnerability allows the uptimed user to achieve root privileges when the uptimed package is emerged. This represents a significant privilege escalation vulnerability that could compromise system security (GENTOO GLSA).

Mitigation and workarounds

Users should upgrade to uptimed version 0.4.6-r1 or later. The fix involves removing the problematic ownership changes in the pkg_postinst phase. The upgrade can be performed using the command: emerge --sync && emerge --ask --oneshot --verbose ">=app-misc/uptimed-0.4.6-r1" (GENTOO GLSA).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61619HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61618HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61617HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61610HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025
CVE-2025-61609HIGH7.5
  • NixOSNixOS
  • android
NoNoDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management