Incorrect Permission Assignment for Critical Resource in Singularity
High severity
GitHub Reviewed
Published
Dec 20, 2021
to the GitHub Advisory Database
•
Updated Sep 18, 2023
Package
Affected versions
>= 3.1.0, < 3.2.0
Patched versions
3.2.0
Description
Published by the National Vulnerability Database
May 14, 2019
Reviewed
May 17, 2021
Published to the GitHub Advisory Database
Dec 20, 2021
Last updated
Sep 18, 2023
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within
/run/singularity/instances/sing/<user>/<instance>
. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.References