A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
| Software | From | Fixed in |
|---|---|---|
| targetcli-fb_project / targetcli-fb | 2.1.51 | 2.1.51.x |
| targetcli-fb_project / targetcli-fb | 2.1.50 | 2.1.50.x |