Home

Description

SingularityCE and SingularityPRO are open source container platforms. Prior to SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5, if a user relies on LSM restrictions to prevent malicious operations then, under certain circumstances, an attacker can redirect the LSM label write operation so that it is ineffective. The attacker must cause the user to run a malicious container image that redirects the mount of /proc to the destination of a shared mount, either known to be configured on the target system, or that will be specified by the user when running the container. The attacker must also control the content of the shared mount, for example through another malicious container which also binds it, or as a user with relevant permissions on the host system it is bound from. This vulnerability is fixed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.

PUBLISHED Reserved 2025-11-10 | Published 2025-12-02 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 4.5CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-61: UNIX Symbolic Link (Symlink) Following

CWE-706: Use of Incorrectly-Resolved Name or Reference

Product status

> 4.2.0-rc.1, < 4.3.5
affected

< 4.1.11
affected

References

github.com/...larity/security/advisories/GHSA-wwrx-w7c9-rf87

github.com/...s/runc/security/advisories/GHSA-cgrx-mc8f-2prm

github.com/sylabs/singularity/pull/3850

github.com/...ommit/27882963879a7af1699fd6511c3f5f1371d80f33

github.com/...ommit/5af3e790c40593591dfc26d0692e4d4b21c29ba0

github.com/advisories/GHSA-fh74-hm69-rqjw

cve.org (CVE-2025-64750)

nvd.nist.gov (CVE-2025-64750)

Download JSON