CVE-2021-32635 Affecting singularity package, versions <3.7.4-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.24% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE321-SINGULARITY-8489520
  • published6 Dec 2024
  • disclosed28 May 2021

Introduced: 28 May 2021

CVE-2021-32635  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 singularity to version 3.7.4-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream singularity package and not the singularity package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Singularity is an open source container platform. In verions 3.7.2 and 3.7.3, Dde to incorrect use of a default URL, singularity action commands (run/shell/exec) specifying a container using a library:// URI will always attempt to retrieve the container from the default remote endpoint (cloud.sylabs.io) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (run/shell/exec) against library:// URIs are affected. Other commands such as pull / push respect the configured remote endpoint. The vulnerability is patched in Singularity version 3.7.4. Two possible workarounds exist: Users can only interact with the default remote endpoint, or an installation can have an execution control list configured to restrict execution to containers signed with specific secure keys.

CVSS Scores

version 3.1