<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for singularity</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2288-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-10-07T15:31:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-10-07T15:31:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-10-07T15:31:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for singularity</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for singularity fixes the following issues:

singularity was updated to version 3.4.1:

This point release addresses the following issues:

- Fixes an issue where a PID namespace was always being used
- Fixes compilation on non 64-bit architectures
- Allows fakeroot builds for zypper, pacstrap, and debootstrap
- Correctly detects seccomp on OpenSUSE
- Honors GO_MODFLAGS properly in the mconfig generated makefile
- Passes the Mac hostname to the VM in MacOS Singularity builds
- Handles temporary EAGAIN failures when setting up loop devices on
recent kernels.

New version 3.4.0. Many changes since 3.2.1, for the full changelog 
  please read CHANGELOG.md

Update to version 3.2.1:

This point release fixes the following bugs:

- Allows users to join instances with non-suid workflow
- Removes false warning when seccomp is disabled on the host
- Fixes an issue in the terminal when piping output to commands
- Binds NVIDIA persistenced socket when `--nv` is invoked

Improve integration with SUSE Products: add support to create Singularity
images with SLE.

* Newer SUSE versions use a different path for the RPM database.
* When the installation succeeds by an installation scriptlet fails
  zypper returns error code 107. Don't treat this as an error.
* In order to specify a repository GPG key, add support for
  multi line variables.
* In order to specify a list of additional repos, add support
  to 'indexed' variables.
* Improve handling of SUSE repositires:

  - For SLE, use SUSEConnect to get all product repos.
  - Allow to specify a repository GPG key.
  - Allow to specify additional installation repositories.

- Add group 'singularity', fix ownerships.

Updated to singularity v3.2.0

* CVE-2019-11328: Instance files are now stored in user's home directory for privacy and
  many checks have been added to ensure that a user can't manipulate files
  to change `starter-suid` behavior when instances are joined (many thanks
  to Matthias Gerstner from the SUSE security team for finding and securely
  reporting this vulnerability) (boo#1128598)

* New features / functionalities

  - Introduced a new basic framework for creating and managing plugins
  - Added the ability to create containers through multi-stage builds
  - Created the concept of a Sylabs Cloud 'remote' endpoint and added the
    ability for users and admins to set them through CLI and conf files 
  - Added caching for images from Singularity Hub
  - Made it possible to compile Singularity outside of `$GOPATH`
  - Added a json partition to SIF files for OCI configuration when building
    from an OCI source
  - Full integration with Singularity desktop for MacOS code base

* New Commands

  - Introduced the `plugin` command group for creating and managing plugins.

* Introduced the `remote` command group to support management of Singularity
  endpoints.
* Added to the `key` command group to improve PGP key management.
* Added the `Stage: &lt;name&gt;` keyword to the definition file header and the
  `from &lt;stage name&gt;` option/argument pair to the `%files` section to
  support multistage builds
* Deprecated / removed commands

  - The `--token/-t` option has been deprecated in favor of the `singularity
    remote` command group

* Changed defaults / behaviors

  - Ask to confirm password on a newly generated PGP key
  - Prompt to push a key to the KeyStore when generated
  - Refuse to push an unsigned container unless overridden with
    `--allow-unauthenticated/-U` option
  - Warn and prompt when pulling an unsigned container without the
       `--allow-unauthenticated/-U` option
For more information check:
   https://github.com/sylabs/singularity/blob/release-3.2/CHANGELOG.md

Updated to singularity v3.1.1:

* New Commands

  - New hidden `buildcfg` command to display compile-time parameters 
  - Added support for `LDFLAGS`, `CFLAGS`, `CGO_` variables in build system
  - Added `--nocolor` flag to Singularity client to disable color in logging

* Removed Commands

  - `singularity capability &lt;add/drop&gt; --desc` has been removed
  - `singularity capability list &lt;--all/--group/--user&gt;` flags have all
    been removed 

* New features / functionalities
  - The `--builder` flag to the `build` command implicitly sets `--remote`
  - Repeated binds no longer cause Singularity to exit and fail, just warn
    instead
  - Corrected typos and improved docstrings throughout
  - Removed warning when CWD does not exist on the host system
  - Added support to spec file for RPM building on SLES 11

Update to singularity 3.1.0 what is reimplementaion in go
so this is a complete new build and just reusing the changelog
entries, following build differences were made to the upstream
spec file

* build position independent executable
* build stripped executable

- Change from /var/singularity to /var/lib/singularity
- Fix warning on bash-completion file about non-executible script.

- Add bash completions directory to file list for suse_version &lt; 1500
  to keep the build checker happy.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2288</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKW24LOLINECHPX4KVSOFZEYFTA7RDEL/#IKW24LOLINECHPX4KVSOFZEYFTA7RDEL</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2288-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1125369</URL>
      <Description>SUSE Bug 1125369</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1128598</URL>
      <Description>SUSE Bug 1128598</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11328/</URL>
      <Description>SUSE CVE CVE-2019-11328 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15">
      <Branch Type="Product Name" Name="SUSE Package Hub 15">
        <FullProductName ProductID="SUSE Package Hub 15">SUSE Package Hub 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP1">
        <FullProductName ProductID="SUSE Package Hub 15 SP1">SUSE Package Hub 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="singularity-3.4.1-bp151.3.3.1">
      <FullProductName ProductID="singularity-3.4.1-bp151.3.3.1">singularity-3.4.1-bp151.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="singularity-3.4.1-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15">
      <FullProductName ProductID="SUSE Package Hub 15:singularity-3.4.1-bp151.3.3.1">singularity-3.4.1-bp151.3.3.1 as a component of SUSE Package Hub 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="singularity-3.4.1-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP1">
      <FullProductName ProductID="SUSE Package Hub 15 SP1:singularity-3.4.1-bp151.3.3.1">singularity-3.4.1-bp151.3.3.1 as a component of SUSE Package Hub 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/&lt;user&gt;/&lt;instance&gt;`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.</Note>
    </Notes>
    <CVE>CVE-2019-11328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP1:singularity-3.4.1-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:singularity-3.4.1-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKW24LOLINECHPX4KVSOFZEYFTA7RDEL/#IKW24LOLINECHPX4KVSOFZEYFTA7RDEL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11328.html</URL>
        <Description>CVE-2019-11328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128598</URL>
        <Description>SUSE Bug 1128598</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
