uptimed before 0.4.6-r1 on Gentoo allows local users (with access to the uptimed user account) to gain root privileges by creating a hard link within the /var/spool/uptimed directory, because there is an unsafe chown -R call.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2020-24103 | uptimed before 0.4.6-r1 on Gentoo allows local users (with access to the uptimed user account) to gain root privileges by creating a hard link within the /var/spool/uptimed directory, because there is an unsafe chown -R call. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Tue, 01 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-59 | |
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-01T20:11:33.838Z
Reserved: 2023-01-25T00:00:00.000Z
Link: CVE-2020-36657
Updated: 2024-08-04T17:30:08.584Z
Status : Modified
Published: 2023-01-26T21:15:21.893
Modified: 2025-04-01T21:15:41.543
Link: CVE-2020-36657
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD