{"id":"CVE-2025-62161","summary":"youki container escape via \"masked path\" abuse due to mount race conditions","details":"Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.","aliases":["GHSA-4g74-7cff-xcv8"],"modified":"2026-04-02T12:57:34.520492Z","published":"2025-11-05T23:09:09.014Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62161.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-363","CWE-61"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62161.json"},{"type":"ADVISORY","url":"https://github.com/youki-dev/youki/security/advisories/GHSA-4g74-7cff-xcv8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-62161"},{"type":"FIX","url":"https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/youki-dev/youki","events":[{"introduced":"0"},{"fixed":"bd54457ba9de1629f21fe678687f433aec63e7c7"}]}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.1.0","v0.2.0","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.4.0","v0.4.1","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62161.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}]}