CVE-2025-62161
Rust vulnerability analysis and mitigation

Overview

Youki, a container runtime written in Rust, has been found to contain a high-severity vulnerability (CVE-2025-62161) in versions 0.5.6 and below. The vulnerability stems from insufficient validation of the source /dev/null during bind mounting operations in the container's file masking process. The issue was discovered and disclosed in November 2025, affecting the cargo package youki (GitHub Advisory).

Technical details

The vulnerability exists in the bind mounting process where youki performs file masking using /dev/null. The core issue lies in two aspects: first, the initial validation fails to verify the genuine presence of /dev/null, and second, there is a timing vulnerability between the validation and the actual mount operation. While the system does validate the existence of the /dev/null path within the container and checks for symbolic links, the race condition between validation and mounting creates a security gap. The vulnerability has been assigned a CVSS v4 score of 7.3 (High), with the following vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H (GitHub Advisory).

Impact

The vulnerability allows an attacker to bind-mount arbitrary files from the host system by replacing /dev/null with a symbolic link during the race condition window. This can lead to container escape, potentially compromising the host system's confidentiality, integrity, and availability. The impact extends to both the vulnerable system and subsequent systems, with high severity ratings across all impact metrics (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.5.5 of youki. Users are advised to upgrade to this version or later to mitigate the risk. Specific mitigation details are marked as TBD in the advisory (GitHub Advisory).

Community reactions

The vulnerability was initially discovered in runc by Lei Wang (@ssst0n3 from Huawei) and further expanded upon by Li Fubang (@lifubang from acmcoder.com, CIIC). The discovery process involved collaboration between security researchers, with @cyphar contributing to identifying the issue in youki, demonstrating the security community's collaborative approach to container runtime security (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64347HIGH7.5
  • RustRust
  • apollo-router
NoYesNov 07, 2025
CVE-2025-64173HIGH7.5
  • RustRust
  • apollo-router
NoYesNov 06, 2025
CVE-2025-62596HIGH7.3
  • RustRust
  • youki
NoYesNov 06, 2025
CVE-2025-62161HIGH7.3
  • RustRust
  • youki
NoYesNov 06, 2025
GHSA-7vjm-6qgq-3mrqLOWN/A
  • RustRust
  • shaman
NoNoNov 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management