You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa singularity

Sigurnosni nedostatak programskog paketa singularity

openSUSE Security Update: Security update for singularity
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:2288-1
Rating: moderate
References: #1125369 #1128598
Cross-References: CVE-2019-11328
Affected Products:
openSUSE Backports SLE-15-SP1
openSUSE Backports SLE-15
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for singularity fixes the following issues:

singularity was updated to version 3.4.1:

This point release addresses the following issues:

– Fixes an issue where a PID namespace was always being used
– Fixes compilation on non 64-bit architectures
– Allows fakeroot builds for zypper, pacstrap, and debootstrap
– Correctly detects seccomp on OpenSUSE
– Honors GO_MODFLAGS properly in the mconfig generated makefile
– Passes the Mac hostname to the VM in MacOS Singularity builds
– Handles temporary EAGAIN failures when setting up loop devices on recent
kernels.

New version 3.4.0. Many changes since 3.2.1, for the full changelog please
read CHANGELOG.md

Update to version 3.2.1:

This point release fixes the following bugs:

– Allows users to join instances with non-suid workflow
– Removes false warning when seccomp is disabled on the host
– Fixes an issue in the terminal when piping output to commands
– Binds NVIDIA persistenced socket when `–nv` is invoked

Improve integration with SUSE Products: add support to create Singularity
images with SLE.

* Newer SUSE versions use a different path for the RPM database.
* When the installation succeeds by an installation scriptlet fails zypper
returns error code 107. Don’t treat this as an error.
* In order to specify a repository GPG key, add support for multi line
variables.
* In order to specify a list of additional repos, add support to ‘indexed’
variables.
* Improve handling of SUSE repositires:

– For SLE, use SUSEConnect to get all product repos.
– Allow to specify a repository GPG key.
– Allow to specify additional installation repositories.

– Add group ‘singularity’, fix ownerships.

Updated to singularity v3.2.0

* CVE-2019-11328: Instance files are now stored in user’s home directory
for privacy and many checks have been added to ensure that a user can’t
manipulate files to change `starter-suid` behavior when instances are
joined (many thanks to Matthias Gerstner from the SUSE security team for
finding and securely reporting this vulnerability) (boo#1128598)

* New features / functionalities

– Introduced a new basic framework for creating and managing plugins
– Added the ability to create containers through multi-stage builds
– Created the concept of a Sylabs Cloud “remote” endpoint and added the
ability for users and admins to set them through CLI and conf files
– Added caching for images from Singularity Hub
– Made it possible to compile Singularity outside of `$GOPATH`
– Added a json partition to SIF files for OCI configuration when
building from an OCI source
– Full integration with Singularity desktop for MacOS code base

* New Commands

– Introduced the `plugin` command group for creating and managing
plugins.

* Introduced the `remote` command group to support management of
Singularity endpoints.
* Added to the `key` command group to improve PGP key management.
* Added the `Stage: <name>` keyword to the definition file header and the
`from <stage name>` option/argument pair to the `%files` section to
support multistage builds
* Deprecated / removed commands

– The `–token/-t` option has been deprecated in favor of the
`singularity remote` command group

* Changed defaults / behaviors

– Ask to confirm password on a newly generated PGP key
– Prompt to push a key to the KeyStore when generated
– Refuse to push an unsigned container unless overridden with
`–allow-unauthenticated/-U` option
– Warn and prompt when pulling an unsigned container without the
`–allow-unauthenticated/-U` option For more information check:
https://github.com/sylabs/singularity/blob/release-3.2/CHANGELOG.md

Updated to singularity v3.1.1:

* New Commands

– New hidden `buildcfg` command to display compile-time parameters
– Added support for `LDFLAGS`, `CFLAGS`, `CGO_` variables in build system
– Added `–nocolor` flag to Singularity client to disable color in
logging

* Removed Commands

– `singularity capability <add/drop> –desc` has been removed
– `singularity capability list <–all/–group/–user>` flags have all
been removed

* New features / functionalities
– The `–builder` flag to the `build` command implicitly sets `–remote`
– Repeated binds no longer cause Singularity to exit and fail, just warn
instead
– Corrected typos and improved docstrings throughout
– Removed warning when CWD does not exist on the host system
– Added support to spec file for RPM building on SLES 11

Update to singularity 3.1.0 what is reimplementaion in go so this is a
complete new build and just reusing the changelog entries, following build
differences were made to the upstream spec file

* build position independent executable
* build stripped executable

– Change from /var/singularity to /var/lib/singularity
– Fix warning on bash-completion file about non-executible script.

– Add bash completions directory to file list for suse_version < 1500 to
keep the build checker happy.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2019-2288=1

– openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2019-2288=1

Package List:

– openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

singularity-3.4.1-bp151.3.3.1
singularity-debuginfo-3.4.1-bp151.3.3.1

– openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

singularity-3.4.1-bp150.2.10.1

References:

https://www.suse.com/security/cve/CVE-2019-11328.html
https://bugzilla.suse.com/1125369
https://bugzilla.suse.com/1128598


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa bind

Otkriven je sigurnosni nedostatak u programskom paketu bind za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close