Description
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2444 | An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host. |
Github GHSA |
GHSA-557g-r22w-9wvx | Incorrect Permission Assignment for Critical Resource in Singularity |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:48:09.093Z
Reserved: 2019-04-18T00:00:00.000Z
Link: CVE-2019-11328
No data.
Status : Modified
Published: 2019-05-14T21:29:01.137
Modified: 2024-11-21T04:20:53.913
Link: CVE-2019-11328
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA