Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
History

Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Youki Project
Youki Project youki
Vendors & Products Youki Project
Youki Project youki

Thu, 14 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Description Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
Title Youki Symlink Following Vulnerability
Weaknesses CWE-61
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-08-14T16:08:00.622Z

Updated: 2025-08-14T19:26:11.541Z

Reserved: 2025-07-31T17:23:33.472Z

Link: CVE-2025-54867

cve-icon Vulnrichment

Updated: 2025-08-14T18:43:09.441Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T16:15:39.933

Modified: 2025-08-15T13:12:51.217

Link: CVE-2025-54867

cve-icon Redhat

No data.