4.5 CVE-2025-65105

Patch
 

Apptainer is an open source container platform. In Apptainer versions less than 1.4.5, a container can disable two of the forms of the little used --security option, in particular the forms --security=apparmor:<profile> and --security=selinux:<label> which otherwise put restrictions on operations that containers can do. The --security option has always been mentioned in Apptainer documentation as being a feature for the root user, although these forms do also work for unprivileged users on systems where the corresponding feature is enabled. Apparmor is enabled by default on Debian-based distributions and SElinux is enabled by default on RHEL-based distributions, but on SUSE it depends on the distribution version. This vulnerability is fixed in 1.4.5.
https://nvd.nist.gov/vuln/detail/CVE-2025-65105

Categories

CWE-61 : UNIX Symbolic Link (Symlink) Following
A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:lfprojects:apptainer:*:*:*:*:*:go:*:* < 1.4.5


REMEDIATION


Patch

Url
https://github.com/apptainer/apptainer/commit/4313b42717e18a4add7dd7503528bc1...
https://github.com/apptainer/apptainer/commit/82f17900a0c31bc769bf9b4612d271c...
https://github.com/apptainer/apptainer/security/advisories/GHSA-j3rw-fx6g-q46j


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
27 Leveraging Race Conditions via Symbolic Links
High