Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62596: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki

0
High
VulnerabilityCVE-2025-62596cvecve-2025-62596cwe-61cwe-363
Published: Wed Nov 05 2025 (11/05/2025, 23:14:37 UTC)
Source: CVE Database V5
Vendor/Project: youki-dev
Product: youki

Description

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

AI-Powered Analysis

AILast updated: 11/13/2025, 00:04:59 UTC

Technical Analysis

CVE-2025-62596 is a vulnerability identified in Youki, a Rust-based container runtime, specifically in versions 0.5.6 and earlier. The flaw stems from insufficiently strict validation of write targets within Youki's AppArmor integration. AppArmor is a Linux kernel security module that confines programs according to a set of profiles. In this case, Youki's handling of AppArmor profiles allows a race condition during pathname resolution, where an attacker can exploit a shared-mount race to substitute intermediate path components. This substitution can redirect write operations to unintended locations within the proc filesystem (procfs), a virtual filesystem that exposes process and kernel information. The vulnerability is categorized under CWE-61 (Improper Restriction of Symbolic Links) and CWE-363 (Race Condition). The attack requires local privileges and user interaction, as indicated by the CVSS vector (AV:L, UI:A, PR:L). The impact on confidentiality, integrity, and availability is high because unauthorized writes to procfs can lead to privilege escalation, process manipulation, or denial of service. Although no known exploits are reported in the wild, the vulnerability poses a significant risk in containerized environments where Youki is deployed. The issue is resolved in Youki version 0.5.7 by enforcing stricter write-target validation and mitigating the race condition during pathname resolution.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those utilizing Youki as their container runtime in production or development environments. The ability to redirect writes to procfs can allow attackers to manipulate kernel or process data, potentially leading to privilege escalation or disruption of containerized services. This can compromise the confidentiality of sensitive data, integrity of system operations, and availability of critical applications. Sectors such as finance, healthcare, telecommunications, and critical infrastructure, which increasingly rely on containerization for scalability and efficiency, are particularly vulnerable. Additionally, organizations employing AppArmor for mandatory access control may have a false sense of security if running vulnerable Youki versions. The risk is heightened in environments where multiple users have local access or where containers run with elevated privileges. The absence of known exploits in the wild suggests a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

The primary mitigation is to upgrade Youki to version 0.5.7 or later, where the vulnerability is fixed. Organizations should audit their container runtimes to identify any instances of Youki below this version. Additionally, review and tighten AppArmor profiles to minimize permissions granted to containerized processes, reducing the attack surface. Implement monitoring for unusual filesystem activity, particularly writes to procfs, which may indicate exploitation attempts. Employ strict access controls to limit local user privileges and reduce the likelihood of exploitation requiring local access. Consider deploying container security tools that can detect race conditions or symbolic link manipulations. Regularly update and patch container runtimes and related components as part of a comprehensive vulnerability management program. Finally, conduct security awareness training for administrators and developers about the risks of symbolic link races and container runtime vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690bdc882de49fb2b5990aa2

Added to database: 11/5/2025, 11:23:52 PM

Last enriched: 11/13/2025, 12:04:59 AM

Last updated: 12/20/2025, 9:11:38 AM

Views: 2031

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats