Browse all 3 CVE security advisories affecting apptainer. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Apptainer provides containerization for scientific computing and HPC environments, enabling portable application execution. Historically, vulnerabilities have included remote code execution through container escapes, privilege escalation via setuid misconfigurations, and path traversal flaws. Security characteristics include rootless operation and sandboxing, though past incidents involved privilege escalation in versions prior to 1.0.0. The project maintains three CVE records, primarily addressing container escape risks and permission model weaknesses. Its design prioritizes security in high-performance contexts, though users must remain vigilant about proper configuration to mitigate potential attack vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-65105 | Apptainer ineffective application of selinux and apparmor --security options — apptainerCWE-61 | 4.5 | Medium | 2025-12-02 |
| CVE-2023-38496 | Apptainer's ineffective privileges drop when requesting container network — apptainerCWE-271 | 6.1 | Medium | 2023-07-25 |
| CVE-2023-30549 | Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer — apptainerCWE-416 | 7.1 | High | 2023-04-25 |
This page lists every published CVE security advisory associated with apptainer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.