Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.
History

Thu, 06 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Youki Project
Youki Project youki
Vendors & Products Youki Project
Youki Project youki

Wed, 05 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
Description Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.
Title youki container escape via "masked path" abuse due to mount race conditions
Weaknesses CWE-363
CWE-61
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-05T23:09:09.014Z

Updated: 2025-11-06T21:20:19.865Z

Reserved: 2025-10-07T16:12:03.424Z

Link: CVE-2025-62161

cve-icon Vulnrichment

Updated: 2025-11-06T21:20:15.330Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-06T00:15:36.760

Modified: 2025-11-06T19:45:09.883

Link: CVE-2025-62161

cve-icon Redhat

No data.