CVE-2019-11328
14.05.2019, 21:29
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.Enginsight
Vendor | Product | Version |
---|---|---|
sylabs | singularity | 3.1.0 ≤ 𝑥 < 3.2.0 |
sylabs | singularity | 3.2.0 |
sylabs | singularity | 3.2.0:rc1 |
sylabs | singularity | 3.2.0:rc2 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References