CVE-2025-62596
06.11.2025, 00:15
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youkis apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
| Vendor | Product | Version |
|---|---|---|
| youki-dev | youki | 𝑥 < 0.5.7 |
𝑥
= Vulnerable software versions