Vulnerability Details CVE-2025-62596
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 3.0%
CVSS Severity
CVSS v3 Score 10.0
Products affected by CVE-2025-62596
-
cpe:2.3:a:youki-dev:youki:0.0.1
-
cpe:2.3:a:youki-dev:youki:0.0.2
-
cpe:2.3:a:youki-dev:youki:0.0.3
-
cpe:2.3:a:youki-dev:youki:0.0.4
-
cpe:2.3:a:youki-dev:youki:0.0.5
-
cpe:2.3:a:youki-dev:youki:0.1.0
-
cpe:2.3:a:youki-dev:youki:0.2.0
-
cpe:2.3:a:youki-dev:youki:0.3.0
-
cpe:2.3:a:youki-dev:youki:0.3.1
-
cpe:2.3:a:youki-dev:youki:0.3.2
-
cpe:2.3:a:youki-dev:youki:0.3.3
-
cpe:2.3:a:youki-dev:youki:0.4.0
-
cpe:2.3:a:youki-dev:youki:0.4.1
-
cpe:2.3:a:youki-dev:youki:0.5.0
-
cpe:2.3:a:youki-dev:youki:0.5.1
-
cpe:2.3:a:youki-dev:youki:0.5.2
-
cpe:2.3:a:youki-dev:youki:0.5.3
-
cpe:2.3:a:youki-dev:youki:0.5.4
-
cpe:2.3:a:youki-dev:youki:0.5.5
-
cpe:2.3:a:youki-dev:youki:0.5.6