CVE-2025-64750
中文标题:
(暂无数据)
英文标题:
Singluarity ineffectively applies of selinux / apparmor LSM process labels
漏洞描述
中文描述:
(暂无数据)
英文描述:
SingularityCE and SingularityPRO are open source container platforms. Prior to SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5, if a user relies on LSM restrictions to prevent malicious operations then, under certain circumstances, an attacker can redirect the LSM label write operation so that it is ineffective. The attacker must cause the user to run a malicious container image that redirects the mount of /proc to the destination of a shared mount, either known to be configured on the target system, or that will be specified by the user when running the container. The attacker must also control the content of the shared mount, for example through another malicious container which also binds it, or as a user with relevant permissions on the host system it is bound from. This vulnerability is fixed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| sylabs | singularity | > 4.2.0-rc.1, < 4.3.5 | - | - |
cpe:2.3:a:sylabs:singularity:>_4.2.0-rc.1,_<_4.3.5:*:*:*:*:*:*:*
|
| sylabs | singularity | < 4.1.11 | - | - |
cpe:2.3:a:sylabs:singularity:<_4.1.11:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-64750 |
2025-12-03 03:24:29 | 2026-01-12 02:12:20 |
| NVD | nvd_CVE-2025-64750 |
2025-12-05 03:00:03 | 2026-01-12 02:28:01 |
版本与语言
安全公告
变更历史
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']