CVE-2025-62596 — UNIX Symbolic Link (Symlink) Following in Youki
Severity
7.3HIGHNVD
EPSS
0.0%
top 85.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateNov 5
PublishedNov 6
Description
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected Packages3 packages
Patches
🔴Vulnerability Details
3CVEList▶
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects↗2025-11-05
GHSA▶
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects↗2025-11-05
OSV▶
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects↗2025-11-05