Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62161: CWE-363: Race Condition Enabling Link Following in youki-dev youki

0
High
VulnerabilityCVE-2025-62161cvecve-2025-62161cwe-363cwe-61
Published: Wed Nov 05 2025 (11/05/2025, 23:09:09 UTC)
Source: CVE Database V5
Vendor/Project: youki-dev
Product: youki

Description

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.

AI-Powered Analysis

AILast updated: 11/05/2025, 23:38:39 UTC

Technical Analysis

CVE-2025-62161 is a race condition vulnerability identified in the youki container runtime, an open-source container runtime written in Rust. The issue exists in versions 0.5.6 and earlier, where the initial validation process for the source /dev/null device during bind mounting is insufficient. Specifically, when youki bind mounts the container's /dev/null as a file mask, it fails to properly verify that the source is indeed the expected device node and not a symbolic link or manipulated file. This flaw allows an attacker with low privileges inside the container to exploit a race condition to follow symbolic links, effectively escaping the container sandbox. The vulnerability is classified under CWE-363 (Race Condition) and CWE-61 (Improper Restriction of Symbolic Links). The CVSS v4.0 score is 7.3 (high severity), reflecting the significant impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and privileges required. Exploitation requires some user interaction but no elevated privileges beyond those of a container user. The vulnerability enables an attacker to break container isolation, potentially gaining unauthorized access to the host system or other containers. The issue was reserved in early October 2025 and published in November 2025. The fix was introduced in youki version 0.5.7, which strengthens validation of the /dev/null device to prevent symbolic link following and race conditions during bind mounting. No public exploits have been reported yet, but the nature of the vulnerability makes it a critical concern for containerized environments relying on youki.

Potential Impact

For European organizations, this vulnerability poses a significant risk to containerized workloads, especially those using youki as the container runtime. Successful exploitation can lead to container escape, allowing attackers to access the host system and potentially lateral movement within the network. This undermines the fundamental security guarantees of container isolation, risking exposure of sensitive data, disruption of services, and compromise of critical infrastructure. Industries relying heavily on containerization, such as finance, telecommunications, healthcare, and government services, could face severe operational and reputational damage. The vulnerability's exploitation could facilitate ransomware deployment, data exfiltration, or sabotage of critical systems. Given the increasing adoption of Rust-based container runtimes in Europe and the growing use of containers in cloud and edge computing, the threat surface is expanding. Although no exploits are currently known in the wild, the vulnerability's characteristics suggest it could be weaponized rapidly once public proof-of-concept code emerges.

Mitigation Recommendations

European organizations should immediately upgrade all youki container runtime deployments to version 0.5.7 or later to apply the official patch that addresses this race condition and symbolic link validation flaw. In addition to patching, organizations should implement strict container security policies, including the use of mandatory access controls (e.g., SELinux, AppArmor) to limit container capabilities and prevent unauthorized file system access. Employ runtime security tools that monitor container behavior for suspicious activities indicative of escape attempts. Avoid running containers with unnecessary privileges or mounting sensitive host paths unless absolutely required. Conduct thorough audits of container configurations and bind mounts to ensure no symbolic links or unsafe file references are used. Incorporate continuous vulnerability scanning and threat intelligence feeds to detect emerging exploits targeting youki or similar runtimes. For critical environments, consider deploying container isolation enhancements such as gVisor or Kata Containers as additional defense layers. Finally, maintain an incident response plan tailored to container escape scenarios to rapidly contain and remediate any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690bdc882de49fb2b5990a9e

Added to database: 11/5/2025, 11:23:52 PM

Last enriched: 11/5/2025, 11:38:39 PM

Last updated: 11/6/2025, 9:11:25 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats