CVE-2025-62596

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
06/11/2025
Last modified:
10/11/2025

Description

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:* 0.5.7 (excluding)