
CVE-2023-30549 – Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer
https://notcve.org/view.php?id=CVE-2023-30549
25 Apr 2023 — Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service an... • https://access.redhat.com/security/cve/cve-2022-1184 • CWE-416: Use After Free •

CVE-2022-23538 – User credentials leaked to third-party service via HTTP redirect in scs-library-client
https://notcve.org/view.php?id=CVE-2022-23538
17 Jan 2023 — github.com/sylabs/scs-library-client is the Go client for the Singularity Container Services (SCS) Container Library Service. When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download. Depending on ... • https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa • CWE-522: Insufficiently Protected Credentials •

CVE-2022-39237 – Digital Signature Hash Algorithms Not Validated in sylabs/sif
https://notcve.org/view.php?id=CVE-2022-39237
06 Oct 2022 — syslabs/sif is the Singularity Image Format (SIF) reference implementation. In versions prior to 2.8.1the `github.com/sylabs/sif/v2/pkg/integrity` package did not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade. Users unable to upgrade may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure. s... • https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-347: Improper Verification of Cryptographic Signature •

CVE-2021-33027
https://notcve.org/view.php?id=CVE-2021-33027
19 Jul 2021 — Sylabs Singularity Enterprise through 1.6.2 has Insufficient Entropy in a nonce. Sylabs Singularity Enterprise versiones hasta 1.6.2, presenta una Entropía Insuficiente en un nonce • https://medium.com/sylabs • CWE-331: Insufficient Entropy •

CVE-2021-33622
https://notcve.org/view.php?id=CVE-2021-33622
15 Jun 2021 — Sylabs Singularity 3.5.x and 3.6.x, and SingularityPRO before 3.5-8, has an Incorrect Check of a Function's Return Value. Sylabs Singularity versiones 3.5.x y 3.6.x, y SingularityPRO versiones anteriores a 3.5-8, presenta una Comprobación Incorrecta del Valor de Retorno de una Función • https://medium.com/sylabs • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2021-32635 – Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
https://notcve.org/view.php?id=CVE-2021-32635
28 May 2021 — Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a no... • https://github.com/sylabs/singularity/releases/tag/v3.7.4 • CWE-20: Improper Input Validation CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •

CVE-2021-29499 – Predictable SIF UUID Identifiers
https://notcve.org/view.php?id=CVE-2021-29499
07 May 2021 — SIF is an open source implementation of the Singularity Container Image Format. The `siftool new` command and func siftool.New() produce predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. A patch is available in version >= v1.2.3 of the module. Users are encouraged to upgrade. As a workaround, users passing CreateInfo struct should ensure the `ID` field is generated using a version of `github.com/satori/go.uuid` that is not ... • https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg • CWE-330: Use of Insufficiently Random Values •

CVE-2021-29136
https://notcve.org/view.php?id=CVE-2021-29136
06 Apr 2021 — Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used. Open Container Initiative umoci versiones anteriores a 0.4.7, permite a atacantes sobrescribir rutas de host arbitrarias por medio de una imagen diseñada que causa un salto de enlace simbólico cuando es usado "umoci unpack" o "umoci raw unpack" • http://www.openwall.com/lists/oss-security/2021/04/06/2 • CWE-20: Improper Input Validation •

CVE-2020-15229 – Path traversal and files overwrite with unsquashfs
https://notcve.org/view.php?id=CVE-2020-15229
14 Oct 2020 — Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image o... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-25040
https://notcve.org/view.php?id=CVE-2020-25040
16 Sep 2020 — Sylabs Singularity through 3.6.2 has Insecure Permissions on temporary directories used in explicit and implicit container build operations, a different vulnerability than CVE-2020-25039. Sylabs Singularity versiones hasta 3.6.2, presenta permisos no seguros en directorios temporales utilizados en operaciones de compilación de contenedores explícitas e implícitas, una vulnerabilidad diferente a CVE-2020-25039 • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html • CWE-668: Exposure of Resource to Wrong Sphere •