Symlink Following Affecting singularity package, versions <4.3.5-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE323-SINGULARITY-14185194
  • published4 Dec 2025
  • disclosed2 Dec 2025

Introduced: 2 Dec 2025

NewCVE-2025-64750  (opens in a new tab)
CWE-61  (opens in a new tab)
CWE-706  (opens in a new tab)

How to fix?

Upgrade Alpine:3.23 singularity to version 4.3.5-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream singularity package and not the singularity package as distributed by Alpine. See How to fix? for Alpine:3.23 relevant fixed versions and status.

SingularityCE and SingularityPRO are open source container platforms. Prior to SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5, if a user relies on LSM restrictions to prevent malicious operations then, under certain circumstances, an attacker can redirect the LSM label write operation so that it is ineffective. The attacker must cause the user to run a malicious container image that redirects the mount of /proc to the destination of a shared mount, either known to be configured on the target system, or that will be specified by the user when running the container. The attacker must also control the content of the shared mount, for example through another malicious container which also binds it, or as a user with relevant permissions on the host system it is bound from. This vulnerability is fixed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.