An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
2019-05-14T21:29:01.137
2024-11-21T04:20:53.913
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sylabs | singularity | < 3.2.0 | Yes |
Application | sylabs | singularity | 3.2.0 | Yes |
Application | sylabs | singularity | 3.2.0 | Yes |
Application | sylabs | singularity | 3.2.0 | Yes |
Operating System | fedoraproject | fedora | 28 | Yes |
Operating System | fedoraproject | fedora | 29 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | opensuse | backports | sle-15 | Yes |
Operating System | opensuse | backports | sle-15 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |