First published: Fri Sep 09 2022(Updated: )
In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Singularity | <4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40299 is considered a medium severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2022-40299, upgrade Singular to version 4.3.1 or later.
CVE-2022-40299 is a local privilege escalation vulnerability caused by predictable /tmp pathnames.
Users of Singular versions prior to 4.3.1 are affected by CVE-2022-40299.
The implications of CVE-2022-40299 include the risk of local users executing arbitrary commands with elevated privileges.