CVE-2025-62161

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:*

History

10 Nov 2025, 18:13

Type Values Removed Values Added
CPE cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 10.0
References () https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a - () https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a - Patch
References () https://github.com/youki-dev/youki/security/advisories/GHSA-4g74-7cff-xcv8 - () https://github.com/youki-dev/youki/security/advisories/GHSA-4g74-7cff-xcv8 - Vendor Advisory
First Time Youki-dev
Youki-dev youki

06 Nov 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-06 00:15

Updated : 2025-11-10 18:13


NVD link : CVE-2025-62161

Mitre link : CVE-2025-62161

CVE.ORG link : CVE-2025-62161


JSON object : View

Products Affected

youki-dev

  • youki
CWE
CWE-61

UNIX Symbolic Link (Symlink) Following

CWE-363

Race Condition Enabling Link Following