Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4g74-7cff-xcv8 | youki container escape via "masked path" abuse due to mount race conditions |
Mon, 10 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Youki-dev
Youki-dev youki |
|
| CPEs | cpe:2.3:a:youki-dev:youki:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Youki-dev
Youki-dev youki |
|
| Metrics |
cvssV3_1
|
Thu, 06 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Youki Project
Youki Project youki |
|
| Vendors & Products |
Youki Project
Youki Project youki |
Wed, 05 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7. | |
| Title | youki container escape via "masked path" abuse due to mount race conditions | |
| Weaknesses | CWE-363 CWE-61 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-06T21:20:19.865Z
Reserved: 2025-10-07T16:12:03.424Z
Link: CVE-2025-62161
Updated: 2025-11-06T21:20:15.330Z
Status : Analyzed
Published: 2025-11-06T00:15:36.760
Modified: 2025-11-10T18:13:27.723
Link: CVE-2025-62161
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:06:50Z
Github GHSA