CVE-2025-62596

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62596
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-62596.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-62596
Aliases
Published
2025-11-05T23:14:37Z
Modified
2025-11-11T02:55:55.131220Z
Severity
  • 7.3 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects
Details

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Database specific
{
    "cwe_ids": [
        "CWE-363",
        "CWE-61"
    ]
}
References

Affected packages

Git / github.com/youki-dev/youki

Affected ranges

Type
GIT
Repo
https://github.com/youki-dev/youki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.1.0
v0.2.0
v0.3.0
v0.3.1
v0.3.2
v0.3.3
v0.4.0
v0.4.1
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.5.5
v0.5.6