9
CVSSv2

CVE-2019-11328

Published: 14/05/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sylabs singularity

sylabs singularity 3.2.0

fedoraproject fedora 28

fedoraproject fedora 29

fedoraproject fedora 30

opensuse leap 15.1

opensuse backports sle-15

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Singularity 310: CVE-2019-11328: namespace privilege escalation and arbitrary file corruption <!--X-Subject-Header-End--> <! ...