A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Targetcli-fb | Targetcli-fb_project | 2.1.50 (including) | 2.1.50 (including) |
Targetcli-fb | Targetcli-fb_project | 2.1.51 (including) | 2.1.51 (including) |
Red Hat Enterprise Linux 8 | RedHat | targetcli-0:2.1.51-4.el8_2 | * |
Targetcli-fb | Ubuntu | eoan | * |
Targetcli-fb | Ubuntu | esm-apps/focal | * |
Targetcli-fb | Ubuntu | focal | * |
Targetcli-fb | Ubuntu | trusty | * |