An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2444 An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
Github GHSA Github GHSA GHSA-557g-r22w-9wvx Incorrect Permission Assignment for Critical Resource in Singularity
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:48:09.093Z

Reserved: 2019-04-18T00:00:00

Link: CVE-2019-11328

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-14T21:29:01.137

Modified: 2024-11-21T04:20:53.913

Link: CVE-2019-11328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses