CVE-2020-8793
NixOS vulnerability analysis and mitigation

Overview

OpenSMTPD before version 6.6.4 contains a local information disclosure vulnerability (CVE-2020-8793) that allows unprivileged local users to read arbitrary files on Linux distributions. The vulnerability stems from a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c. The vulnerability was discovered and reported by Qualys Security Advisory in February 2020 (OSS Security).

Technical details

The vulnerability exploits a combination of issues including a Local Privilege Escalation into the group _smtpq and TOCTOU (time-of-check to time-of-use) race conditions. The vulnerability allows attackers to bypass both the _smtpq group check in offline_scan() and the hardlink check in offline_enqueue(). The attack involves creating hardlinks to target files and manipulating file states between checks, enabling access to restricted files (OSS Security).

Impact

An unprivileged local attacker can read the first line of any arbitrary file (such as root's password hash in /etc/master.passwd) or the entire contents of another user's file if this file and /var/spool/smtpd/ are on the same filesystem. On Fedora 31, due to smtpctl being set-group-ID root instead of set-group-ID smtpq, the vulnerability could be exploited to obtain full root privileges (OSS Security).

Mitigation and workarounds

The vulnerability was fixed in OpenSMTPD version 6.6.4. Ubuntu ships with /proc/sys/fs/protected_hardlinks enabled by default, making this vulnerability not exploitable on Ubuntu systems. For Fedora, the fix was implemented in opensmtpd-6.6.2p1-1.fc31, released on February 9, 2020, which correctly made smtpctl set-group-ID smtpq instead of set-group-ID root (Ubuntu Security, OSS Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-69264CRITICAL9.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH8.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management