Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
History

Mon, 10 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Youki-dev
Youki-dev youki
CPEs cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:*
Vendors & Products Youki-dev
Youki-dev youki
Metrics cvssV3_1

{'score': 10.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}


Thu, 06 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Youki Project
Youki Project youki
Vendors & Products Youki Project
Youki Project youki

Wed, 05 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
Description Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
Title youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects
Weaknesses CWE-363
CWE-61
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-05T23:14:37.167Z

Updated: 2025-11-06T16:54:15.942Z

Reserved: 2025-10-16T19:24:37.266Z

Link: CVE-2025-62596

cve-icon Vulnrichment

Updated: 2025-11-06T16:54:13.521Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-06T00:15:37.817

Modified: 2025-11-10T17:58:27.753

Link: CVE-2025-62596

cve-icon Redhat

No data.