Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU1N2ctcjIydy05d3Z4

Incorrect Permission Assignment for Critical Resource in Singularity

An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within /run/singularity/instances/sing/<user>/<instance>. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.

Permalink: https://github.com/advisories/GHSA-557g-r22w-9wvx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU1N2ctcjIydy05d3Z4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: about 1 year ago


CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-557g-r22w-9wvx, CVE-2019-11328
References: Repository: https://github.com/sylabs/singularity
Blast Radius: 7.9

Affected Packages

go:github.com/sylabs/singularity
Dependent packages: 3
Dependent repositories: 8
Downloads:
Affected Version Ranges: >= 3.1.0, < 3.2.0
Fixed in: 3.2.0
All affected versions: 3.1.0, 3.1.1
All unaffected versions: 3.0.0, 3.0.1, 3.0.2, 3.0.3