Skip to content

Commit 6e59f31

Browse files
authored
Merge pull request #5907 from dtrudg/37umoci047
Update opencontainers/umoci to v0.4.7 (release-3.7)
2 parents 47d3b5d + 269d0d8 commit 6e59f31

File tree

8 files changed

+82
-78
lines changed

8 files changed

+82
-78
lines changed

Diff for: CHANGELOG.md

+12
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,18 @@ _With the release of `v3.0.0`, we're introducing a new changelog format in an at
99

1010
_The old changelog can be found in the `release-2.6` branch_
1111

12+
# v3.7.3 - [2021-04-06]
13+
14+
## Security Related Fixes
15+
16+
- [CVE-2021-29136](https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v):
17+
A dependency used by Singularity to extract docker/OCI image layers
18+
can be tricked into modifying host files by creating a malicious
19+
layer that has a symlink with the name "." (or "/"), when running
20+
as root. This vulnerability affects a `singularity build` or
21+
`singularity pull` as root, from a docker or OCI source.
22+
23+
1224
# v3.7.2 - [2021-03-09]
1325

1426
## Bug Fixes

Diff for: INSTALL.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ as shown above. Then download the latest
133133
and use it to install the RPM like this:
134134

135135
```
136-
$ export VERSION=3.7.2 # this is the singularity version, change as you need
136+
$ export VERSION=3.7.3 # this is the singularity version, change as you need
137137
138138
$ wget https://github.com/sylabs/singularity/releases/download/v${VERSION}/singularity-${VERSION}.tar.gz && \
139139
rpmbuild -tb singularity-${VERSION}.tar.gz && \
@@ -149,7 +149,7 @@ tarball and use it to install Singularity:
149149
$ cd $GOPATH/src/github.com/sylabs/singularity && \
150150
./mconfig && \
151151
make -C builddir rpm && \
152-
sudo rpm -ivh ~/rpmbuild/RPMS/x86_64/singularity-3.7.2*.x86_64.rpm # or whatever version you built
152+
sudo rpm -ivh ~/rpmbuild/RPMS/x86_64/singularity-3.7.3*.x86_64.rpm # or whatever version you built
153153
```
154154

155155
To build an rpm with an alternative install prefix set RPMPREFIX on the

Diff for: e2e/oci/oci.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ import (
1212
"runtime"
1313
"testing"
1414

15+
"github.com/opencontainers/runtime-spec/specs-go"
1516
"github.com/pkg/errors"
1617
uuid "github.com/satori/go.uuid"
1718
"github.com/sylabs/singularity/e2e/internal/e2e"
@@ -33,7 +34,7 @@ func (c *ctx) checkOciState(t *testing.T, containerID, state string) {
3334
t.Errorf("can't unmarshal oci state output: %+v", err)
3435
return
3536
}
36-
if s.Status != state {
37+
if s.Status != specs.ContainerState(state) {
3738
t.Errorf("bad container state returned, got %s instead of %s", s.Status, state)
3839
}
3940
}

Diff for: go.mod

+12-6
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ module github.com/sylabs/singularity
33
go 1.13
44

55
require (
6+
github.com/AdamKorcz/go-fuzz-headers v0.0.0-20210319161527-f761c2329661 // indirect
67
github.com/Netflix/go-expect v0.0.0-20190729225929-0e00d9168667
78
github.com/adigunhammedolalekan/registry-auth v0.0.0-20200730122110-8cde180a3a60
89
github.com/alexflint/go-filemutex v0.0.0-20171028004239-d358565f3c3f // indirect
@@ -23,37 +24,42 @@ require (
2324
github.com/godbus/dbus v4.1.0+incompatible // indirect
2425
github.com/gofrs/uuid v3.2.0+incompatible // indirect
2526
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e // indirect
27+
github.com/golang/protobuf v1.5.2 // indirect
2628
github.com/gorilla/handlers v1.4.0 // indirect
2729
github.com/gorilla/websocket v1.4.2
2830
github.com/kardianos/osext v0.0.0-20190222173326-2bc1f35cddc0 // indirect
31+
github.com/klauspost/compress v1.11.13 // indirect
2932
github.com/kr/pty v1.1.8
3033
github.com/opencontainers/go-digest v1.0.0
31-
github.com/opencontainers/image-spec v1.0.2-0.20191218002246-9ea04d1f37d7
32-
github.com/opencontainers/runtime-spec v1.0.3-0.20200710190001-3e4195d92445
34+
github.com/opencontainers/image-spec v1.0.2-0.20210331164927-859973e32cca
35+
github.com/opencontainers/runc v1.0.0-rc93 // indirect
36+
github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417
3337
github.com/opencontainers/selinux v1.8.0
34-
github.com/opencontainers/umoci v0.4.6
38+
github.com/opencontainers/umoci v0.4.7
3539
github.com/pelletier/go-toml v1.8.1
3640
github.com/pkg/errors v0.9.1
41+
github.com/russross/blackfriday/v2 v2.1.0 // indirect
3742
github.com/satori/go.uuid v1.2.0
3843
github.com/seccomp/containers-golang v0.6.0
3944
github.com/seccomp/libseccomp-golang v0.9.1
45+
github.com/sirupsen/logrus v1.8.1 // indirect
4046
github.com/spf13/cobra v1.1.3
4147
github.com/spf13/pflag v1.0.5
4248
github.com/sylabs/json-resp v0.7.0
4349
github.com/sylabs/scs-build-client v0.1.5
4450
github.com/sylabs/scs-key-client v0.6.0
4551
github.com/sylabs/scs-library-client v1.0.3
4652
github.com/sylabs/sif v1.2.1
53+
github.com/urfave/cli v1.22.5 // indirect
4754
github.com/vbauerster/mpb/v4 v4.12.2
4855
github.com/vbauerster/mpb/v6 v6.0.2
4956
github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb // indirect
5057
github.com/yvasiyarov/go-metrics v0.0.0-20150112132944-c25f46c4b940 // indirect
5158
github.com/yvasiyarov/gorelic v0.0.6 // indirect
5259
github.com/yvasiyarov/newrelic_platform_go v0.0.0-20160601141957-9c099fbc30e9 // indirect
5360
go.opencensus.io v0.22.2 // indirect
54-
golang.org/x/crypto v0.0.0-20201221181555-eec23a3978ad
55-
golang.org/x/net v0.0.0-20201021035429-f5854403a974 // indirect
56-
golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c
61+
golang.org/x/crypto v0.0.0-20210322153248-0c34fe9e7dc2
62+
golang.org/x/sys v0.0.0-20210403161142-5e06dd20ab57
5763
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 // indirect
5864
gopkg.in/yaml.v2 v2.4.0
5965
gotest.tools/v3 v3.0.3

0 commit comments

Comments
 (0)