Skip to content

OSG-SEC-2018-04-30 Multiple Singularity Vulnerabilities

Dear OSG Security Contacts,

Multiple vulnerabilities have been publicly reported concerning setuid-root installations of Singularity, including more than one way for a user outside of a container to escalate privileges. OSG security considers this a Critical vulnerability and the impact is high for our infrastructure. A new version is available in the osg-development yum repository and it is planned to be released to the osg yum repository in the morning on Tuesday, May 1.

IMPACTED VERSIONS:

Singularity versions 2.4.6 and earlier are impacted. Both EL6 and EL7 based systems are impacted. Installations using unprivileged singularity [1] on EL7 are not affected by these issues.

WHAT ARE THE VULNERABILITIES:

Unprivileged users who have access to run setuid-root singularity can:

  • create world writable files in root-owned directories on the host system
  • create folders outside of the container
  • bypass the “enable overlay = no” option in singularity.conf (EL7 only)
  • exploit buffer overflows

For more details see the singularity-2.5.0 release announcement [2]. Note especially that jobs running inside of singularity containers are not able to exploit these vulnerabilities.

WHAT YOU SHOULD DO:

IMMEDIATELY begin testing the latest singularity version with the following command:

  • yum update --enablerepo=osg-development singularity-runtime

Version 2.5.0-1.1.osg34 includes a pending pull request [3], and there is one more potential known issue at this time [4] but it is not known to affect OSG use cases.

Report any problems seen to [email protected] If no problems are seen with your use cases you may upgrade before the release to the osg yum repository.

  • http://opensciencegrid.github.io/docs/worker-node/install-singularity/ - OSG singularity install documentation.
  • https://ticket.grid.iu.edu/37322

REFERENCES

  • [1] http://opensciencegrid.github.io/docs/worker-node/install-singularity/#unprivileged-singularity
  • [2] https://github.com/singularityware/singularity/releases/tag/2.5.0
  • [3] https://github.com/singularityware/singularity/pull/1491
  • [4] https://github.com/singularityware/singularity/pull/1490

Please contact the OSG security team at [email protected] if you have any questions or concerns.

OSG Security Team