Description
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-3130 | A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. |
Ubuntu USN |
USN-4871-1 | targetcli-fb vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:06:11.137Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10699
No data.
Status : Modified
Published: 2020-04-15T14:15:19.873
Modified: 2024-11-21T04:55:52.773
Link: CVE-2020-10699
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN