CVE-2020-10699

NameCVE-2020-10699
DescriptionA flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
targetcli-fb (PTS)buster2.1.48-2fixed
bullseye1:2.1.53-1fixed
sid, trixie, bookworm1:2.1.53-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
targetcli-fbsource(unstable)(not affected)

Notes

- targetcli-fb <not-affected> (Vulnerable code introduced later)
https://github.com/open-iscsi/targetcli-fb/issues/162
Introduced in: https://github.com/open-iscsi/targetcli-fb/commit/ad37f94ae72d0e3d5963ce182e2897c84af9c039 (v2.1.50)
Fixed by: https://github.com/open-iscsi/targetcli-fb/commit/6e4f39357a90a914d11bac21cc2d2b52c07c213d

Search for package or bug name: Reporting problems