Message ID | b3ac8bd5d34c01dd2eb6897015fc931c6fc15770.1544734119.git.leo@famulari.name |
---|---|
State | Accepted |
Commit | edc6dd03240b8fe0a1530ce0e80637641903095e |
Headers | show |
Series | [bug#33730] gnu: Singularity: Update to 2.6.1 [fixes CVE-2018-19295]. | expand |
Context | Check | Description |
---|---|---|
cbaines/applying patch | success | Successfully applied |
Hi Leo, Leo Famulari <leo@famulari.name> skribis: > Our Singularity package is not vulnerable to CVE-2018-19295 by default, > becuase that vulnerability is based on the 'mount', 'start', and > 'action' Singularity binaries being installed setuid, which we do not do > in Guix. > > * gnu/packages/linux.scm (singularity): Update to 2.6.1. LGTM. Thanks for the patch and for the analysis! Ludo’.
On Thu, Dec 13, 2018 at 11:52:09PM +0100, Ludovic Courtès wrote:
> LGTM. Thanks for the patch and for the analysis!
Thanks! Pushed as edc6dd03240b8fe0a1530ce0e80637641903095e
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm index 1cdf2bf47..de6439449 100644 --- a/gnu/packages/linux.scm +++ b/gnu/packages/linux.scm @@ -2612,7 +2612,7 @@ thanks to the use of namespaces.") (define-public singularity (package (name "singularity") - (version "2.5.1") + (version "2.6.1") (source (origin (method url-fetch) (uri (string-append "https://github.com/singularityware/singularity/" @@ -2620,7 +2620,7 @@ thanks to the use of namespaces.") "/singularity-" version ".tar.gz")) (sha256 (base32 - "0f28dgf2qcy8ljjfix7p9q36q12j7rxyicfzzi4n0fl8zr8ab88g")))) + "1whx0hqqi1326scgdxxxa1d94vn95mnq0drid6s8wdp84ni4d3gk")))) (build-system gnu-build-system) (arguments `(#:configure-flags