Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 657020 (CVE-2018-19295) - <sys-cluster/singularity-2.6.1: Information leak (CVE-2018-19295)
Summary: <sys-cluster/singularity-2.6.1: Information leak (CVE-2018-19295)
Status: RESOLVED FIXED
Alias: CVE-2018-19295
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-05-31 22:02 UTC by Oliver Freyermuth
Modified: 2020-03-28 20:29 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
=sys-cluster/singularity-2.6.0.ebuild (singularity-2.6.0.ebuild,856 bytes, text/plain)
2018-10-17 09:39 UTC, Till Korten
no flags Details
sys-cluster/singularity-3.0.1.ebuild (singularity-3.0.1.ebuild,1.24 KB, text/plain)
2018-11-07 20:54 UTC, Timo Rothenpieler
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Oliver Freyermuth 2018-05-31 22:02:09 UTC
Versions before 2.5.0 have many security vulnerabilities and should be installed anymore. 
2.5.1 has been released about a month ago:
https://github.com/singularityware/singularity/releases
Comment 1 Till Korten 2018-10-17 09:39:30 UTC
Created attachment 551636 [details]
=sys-cluster/singularity-2.6.0.ebuild

Updated ebuild for sys-cluster/singularity-2.6.0
I only changed the account in the github download url to 'sylabs'. Compiles and runs fine on my amd64 machine.
Comment 2 Timo Rothenpieler 2018-11-07 20:54:15 UTC
Created attachment 554458 [details]
sys-cluster/singularity-3.0.1.ebuild

Updated ebuild for v3.0.1.
Comment 3 D'juan McDonald (domhnall) 2018-11-08 08:44:45 UTC
CVE-2018-12021(https://nvd.nist.gov/vuln/detail/CVE-2018-12021):
Singularity 2.3.0 through 2.5.1 is affected by an incorrect access control on systems supporting overlay file system. When using the overlay option, a malicious user may access sensitive information by exploiting a few specific Singularity features.


Upstream: https://github.com/sylabs/singularity/releases/tag/2.5.2
A malicious user with network access to the host system (e.g. ssh) could exploit this vulnerability to access sensitive information on disk and bypass directory image restrictions like those preventing the root file system from being mounted into the container.
Comment 4 Justin Lecher (RETIRED) gentoo-dev 2019-07-08 19:37:14 UTC
commit e5282d8147687f9785ac63d6d050995492cebaad (HEAD -> master, origin/master, origin/HEAD)
Author: Justin Lecher <jlec@gentoo.org>
Date:   Mon Jul 8 13:23:22 2019 +0100

    sys-cluster/singularity: Version Bump & drop vulnerable version

    https://bugs.gentoo.org/657020

    Package-Manager: Portage-2.3.68, Repoman-2.3.16
    Signed-off-by: Justin Lecher <jlec@gentoo.org>
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-28 20:29:39 UTC
Closing because noglsa and tree is clean.