Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Youki Project
Youki Project youki |
|
Vendors & Products |
Youki Project
Youki Project youki |
Thu, 14 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 14 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5. | |
Title | Youki Symlink Following Vulnerability | |
Weaknesses | CWE-61 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-14T16:08:00.622Z
Updated: 2025-08-14T19:26:11.541Z
Reserved: 2025-07-31T17:23:33.472Z
Link: CVE-2025-54867

Updated: 2025-08-14T18:43:09.441Z

Status : Awaiting Analysis
Published: 2025-08-14T16:15:39.933
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-54867

No data.