U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2020-15229 Detail

Description

Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html Broken Link  Mailing List  Third Party Advisory 
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00070.html Broken Link  Mailing List  Third Party Advisory 
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html Broken Link  Mailing List  Third Party Advisory 
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00071.html Broken Link  Mailing List  Third Party Advisory 
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html Broken Link  Mailing List  Third Party Advisory 
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00009.html Broken Link  Mailing List  Third Party Advisory 
https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes Release Notes  Third Party Advisory 
https://github.com/hpcng/singularity/blob/v3.6.4/CHANGELOG.md#security-related-fixes Release Notes  Third Party Advisory 
https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e Patch  Third Party Advisory 
https://github.com/hpcng/singularity/commit/eba3dea260b117198fdb6faf41f2482ab2f8d53e Patch  Third Party Advisory 
https://github.com/hpcng/singularity/pull/5611 Patch  Third Party Advisory 
https://github.com/hpcng/singularity/pull/5611 Patch  Third Party Advisory 
https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9 Third Party Advisory 
https://github.com/hpcng/singularity/security/advisories/GHSA-7gcp-w6ww-2xv9 Third Party Advisory 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') GitHub, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-15229
NVD Published Date:
10/14/2020
NVD Last Modified:
11/21/2024
Source:
GitHub, Inc.