Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. youki
  4. ›
  5. CVE-2025-62596

CVE-2025-62596: youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects

November 5, 2025 (updated November 15, 2025)

Impact

youki’s apparmor handling performs insufficiently strict write-target validation, which—combined with path substitution during pathname resolution—can allow writes to unintended procfs locations.

Weak write-target check youki only verifies that the destination lies somewhere under procfs. As a result, a write intended for /proc/self/attr/apparmor/exec can succeed even if the path has been redirected to /proc/sys/kernel/hostname(which is also in procfs).

Path substitution While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target.

This is a different project, but the core logic is similar to the CVE in runc. Issues were identified in runc, and verification was also conducted in youki to confirm the problems. https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm

Credits

Thanks to Li Fubang (@lifubang from acmcoder.com, CIIC) and Tõnis Tiigi (@tonistiigi from Docker) for both independently discovering runc’s original vulnerability, as well as Aleksa Sarai (@cyphar from SUSE) for the original research into this class of security issues and solutions.

References

  • github.com/advisories/GHSA-vf95-55w6-qmrf
  • github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
  • github.com/youki-dev/youki
  • github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a
  • github.com/youki-dev/youki/security/advisories/GHSA-vf95-55w6-qmrf
  • nvd.nist.gov/vuln/detail/CVE-2025-62596
  • pkg.go.dev/github.com/cyphar/filepath-securejoin/pathrs-lite/procfs
  • youtu.be/tGseJW_uBB8
  • youtu.be/y1PaBzxwRWQ

Code Behaviors & Features

Detect and mitigate CVE-2025-62596 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.5.7

Fixed versions

  • 0.5.7

Solution

Upgrade to version 0.5.7 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-363: Race Condition Enabling Link Following
  • CWE-61: UNIX Symbolic Link (Symlink) Following

Source file

cargo/youki/CVE-2025-62596.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:37:13 +0000.