icon

We found results for “

CVE-2025-62596

Good to know:

icon
icon

Date: November 5, 2025

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Severity Score

Severity Score

Weakness Type (CWE)

Race Condition Enabling Link Following

CWE-363

UNIX Symbolic Link (Symlink) Following

CWE-61

Top Fix

icon

Upgrade Version

Upgrade to version youki - 0.5.7;https://github.com/youki-dev/youki.git - v0.5.7

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us