Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.
References
Configurations
History
10 Nov 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
| References | () https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a - Patch | |
| References | () https://github.com/youki-dev/youki/security/advisories/GHSA-4g74-7cff-xcv8 - Vendor Advisory | |
| First Time |
Youki-dev
Youki-dev youki |
06 Nov 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-06 00:15
Updated : 2025-11-10 18:13
NVD link : CVE-2025-62161
Mitre link : CVE-2025-62161
CVE.ORG link : CVE-2025-62161
JSON object : View
Products Affected
youki-dev
- youki
