CVE-2025-62161

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62161
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-62161.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-62161
Aliases
Published
2025-11-05T23:09:09Z
Modified
2025-11-08T19:53:12.622585Z
Severity
  • 7.3 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
youki container escape via "masked path" abuse due to mount race conditions
Details

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.

Database specific
{
    "cwe_ids": [
        "CWE-363",
        "CWE-61"
    ]
}
References

Affected packages

Git / github.com/youki-dev/youki

Affected ranges

Type
GIT
Repo
https://github.com/youki-dev/youki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.1.0
v0.2.0
v0.3.0
v0.3.1
v0.3.2
v0.3.3
v0.4.0
v0.4.1
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.5.5
v0.5.6