<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for singularity</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1497-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-21T18:21:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-21T18:21:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-21T18:21:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for singularity</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for singularity fixes the following issues:

New version 3.6.3, addresses the following security issues:

- CVE-2020-25039, boo#1176705

  When a Singularity action command (run, shell, exec) is run with 
  the fakeroot or user namespace option, Singularity will extract 
  a container image to a temporary sandbox directory. 
  Due to insecure permissions on the temporary directory it is possible 
  for any user with access to the system to read the contents of the image. 
  Additionally, if the image contains a world-writable file or directory, 
  it is possible for a user to inject arbitrary content into the running 
  container. 

- CVE-2020-25040, boo#1176707

  When a Singularity command that results in a container 
  build operation is executed, it is possible for a user with access 
  to the system to read the contents of the image during the build. 
  Additionally, if the image contains a world-writable file or directory, 
  it is possible for a user to inject arbitrary content into the running 
  build, which in certain circumstances may enable arbitrary code execution 
  during the build and/or when the built container is run.

New version 3.6.2, new features / functionalities:

  -Add --force option to singularity delete for non-interactive 
   workflows.
  -Support compilation with FORTIFY_SOURCE=2 and build in pie mode 
   with fstack-protector enabled
  - Changed defaults / behaviours
   -Default to current architecture for singularity delete.
  - Bug Fixes
   -Respect current remote for singularity delete command.
   -Allow rw as a (noop) bind option.
   -Fix capability handling regression in overlay mount.
   -Fix LD_LIBRARY_PATH environment override regression with --nv/--rocm.
   -Fix environment variable duplication within singularity engine.
   -Use -user-xattrs for unsquashfs to avoid error with rootless 
    extraction using unsquashfs 3.4
   -Correct --no-home message for 3.6 CWD behavior.
   -Don't fail if parent of cache dir not accessible.
   -Fix tests for Go 1.15 Ctty handling.
   -Fix additional issues with test images on ARM64.
   -Fix FUSE e2e tests to use container ssh_config.
   -Provide advisory message r.e. need for upper and work to exist 
    in overlay images.
   -Use squashfs mem and processor limits in squashfs gzip check.
   -Ensure build destination path is not an empty string - do not 
    overwrite CWD.
   -Don't unset PATH when interpreting legacy /environment files.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1497</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKNKE5OJY3RKFINGTNXXOQ62VX3JCLB3/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1497-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176705</URL>
      <Description>SUSE Bug 1176705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176707</URL>
      <Description>SUSE Bug 1176707</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25039/</URL>
      <Description>SUSE CVE CVE-2020-25039 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25040/</URL>
      <Description>SUSE CVE CVE-2020-25040 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="singularity-3.6.3-lp152.2.6.1">
      <FullProductName ProductID="singularity-3.6.3-lp152.2.6.1">singularity-3.6.3-lp152.2.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="singularity-3.6.3-lp152.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:singularity-3.6.3-lp152.2.6.1">singularity-3.6.3-lp152.2.6.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="singularity-3.6.3-lp152.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:singularity-3.6.3-lp152.2.6.1">singularity-3.6.3-lp152.2.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sylabs Singularity 3.2.0 through 3.6.2 has Insecure Permissions on temporary directories used in fakeroot or user namespace container execution.</Note>
    </Notes>
    <CVE>CVE-2020-25039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:singularity-3.6.3-lp152.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:singularity-3.6.3-lp152.2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKNKE5OJY3RKFINGTNXXOQ62VX3JCLB3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25039.html</URL>
        <Description>CVE-2020-25039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176705</URL>
        <Description>SUSE Bug 1176705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176707</URL>
        <Description>SUSE Bug 1176707</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039.</Note>
    </Notes>
    <CVE>CVE-2020-25040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:singularity-3.6.3-lp152.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:singularity-3.6.3-lp152.2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKNKE5OJY3RKFINGTNXXOQ62VX3JCLB3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25040.html</URL>
        <Description>CVE-2020-25040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176707</URL>
        <Description>SUSE Bug 1176707</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
