CVE-2025-64750

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64750
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64750.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-64750
Aliases
Downstream
Related
Published
2025-12-02T17:25:55.825Z
Modified
2025-12-04T05:09:01.546210Z
Severity
  • 4.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Singluarity ineffectively applies of selinux / apparmor LSM process labels
Details

SingularityCE and SingularityPRO are open source container platforms. Prior to SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5, if a user relies on LSM restrictions to prevent malicious operations then, under certain circumstances, an attacker can redirect the LSM label write operation so that it is ineffective. The attacker must cause the user to run a malicious container image that redirects the mount of /proc to the destination of a shared mount, either known to be configured on the target system, or that will be specified by the user when running the container. The attacker must also control the content of the shared mount, for example through another malicious container which also binds it, or as a user with relevant permissions on the host system it is bound from. This vulnerability is fixed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64750.json",
    "cwe_ids": [
        "CWE-61",
        "CWE-706"
    ]
}
References

Affected packages

Git / github.com/sylabs/singularity

Affected ranges

Type
GIT
Repo
https://github.com/sylabs/singularity
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0

2.*

2.0
2.1
2.1.1
2.1.2
2.2
2.3
2.3.1
2.3.2
2.4
2.4.1
2.4.2

v3.*

v3.0.0
v3.0.0-alpha.1
v3.0.0-alpha.2
v3.0.0-beta.1
v3.0.1
v3.0.2
v3.0.2-rc1
v3.0.2-rc2
v3.0.3
v3.0.3-rc1
v3.0.3-rc2
v3.1.0
v3.1.0-rc1
v3.1.0-rc2
v3.1.0-rc3
v3.1.0-rc4
v3.1.1
v3.1.1-rc1
v3.10.0
v3.10.0-rc.1
v3.10.0-rc.2
v3.11.0
v3.11.0-rc.1
v3.11.0-rc.2
v3.2.0
v3.2.0-rc1
v3.2.0-rc2
v3.2.1
v3.2.1-rc1
v3.3.0
v3.3.0-rc.1
v3.3.0-rc.2
v3.3.0-rc.3
v3.3.0-rc.4
v3.4.0
v3.4.0-rc.1
v3.4.0-rc.2
v3.4.1
v3.4.1-rc.1
v3.4.2
v3.4.2-rc.1
v3.5.0
v3.5.0-rc.1
v3.5.0-rc.2
v3.5.1
v3.5.1-rc.1
v3.5.1-rc.2
v3.5.2
v3.6.0
v3.6.0-rc.1
v3.6.0-rc.2
v3.6.0-rc.3
v3.6.0-rc.4
v3.6.0-rc.5
v3.6.1
v3.6.2
v3.6.3
v3.6.4
v3.7.0
v3.7.0-rc.1
v3.7.0-rc.2
v3.7.1
v3.7.2
v3.7.3
v3.8.0-rc.1
v3.9.0
v3.9.0-rc.1
v3.9.0-rc.2
v3.9.0-rc.3
v3.9.1

v4.*

v4.0.0-rc.1
v4.1.0-rc.1
v4.2.0-rc.1
v4.3.0
v4.3.0-rc.1