CVE-2025-62596
EUVD-2025-3793806.11.2025, 00:15
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| youki-dev | youki | 𝑥 < 0.5.7 |
𝑥
= Vulnerable software versions