CVE-2025-62596UNIX Symbolic Link (Symlink) Following in Youki

Severity
7.3HIGHNVD
EPSS
0.0%
top 85.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateNov 5
PublishedNov 6

Description

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages3 packages

CVEListV5youki-dev/youki< 0.5.7
NVDyouki-dev/youki< 0.5.7
crates.ioyouki-dev/youki< 0.5.7

Patches

🔴Vulnerability Details

3
CVEList
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects2025-11-05
GHSA
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects2025-11-05
OSV
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects2025-11-05
CVE-2025-62596 — UNIX Symbolic Link (Symlink) Following | cvebase