Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-11328


An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.


Published

2019-05-14T21:29:01.137

Last Modified

2024-11-21T04:20:53.913

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-732

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sylabs singularity < 3.2.0 Yes
Application sylabs singularity 3.2.0 Yes
Application sylabs singularity 3.2.0 Yes
Application sylabs singularity 3.2.0 Yes
Operating System fedoraproject fedora 28 Yes
Operating System fedoraproject fedora 29 Yes
Operating System fedoraproject fedora 30 Yes
Operating System opensuse backports sle-15 Yes
Operating System opensuse backports sle-15 Yes
Operating System opensuse leap 15.1 Yes

References