CVE-2025-62596
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
06/11/2025
Last modified:
10/11/2025
Description
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
Impact
Base Score 4.0
7.30
Severity 4.0
HIGH
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:* | 0.5.7 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



