CVE-2025-54867

Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
Configurations

Configuration 1 (hide)

cpe:2.3:a:youki-dev:youki:*:*:*:*:*:*:*:*

History

10 Nov 2025, 17:50

Type Values Removed Values Added
CPE cpe:2.3:a:youki-dev:youki:*:*:*:*:*:*:*:*
References () https://github.com/youki-dev/youki/commit/0d9b4f2aa5ceaf988f3eb568711d2acf0a4ace37 - () https://github.com/youki-dev/youki/commit/0d9b4f2aa5ceaf988f3eb568711d2acf0a4ace37 - Patch
References () https://github.com/youki-dev/youki/releases/tag/v0.5.5 - () https://github.com/youki-dev/youki/releases/tag/v0.5.5 - Release Notes
References () https://github.com/youki-dev/youki/security/advisories/GHSA-j26p-6wx7-f3pw - () https://github.com/youki-dev/youki/security/advisories/GHSA-j26p-6wx7-f3pw - Vendor Advisory
First Time Youki-dev
Youki-dev youki
Summary
  • (es) Youki es un entorno de ejecución de contenedores escrito en Rust. Antes de la versión 0.5.5, si /proc y /sys en rootfs eran enlaces simbólicos, podían explotarse para acceder al sistema de archivos raíz del host. Este problema se ha corregido en la versión 0.5.5.

14 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-14 16:15

Updated : 2025-11-10 17:50


NVD link : CVE-2025-54867

Mitre link : CVE-2025-54867

CVE.ORG link : CVE-2025-54867


JSON object : View

Products Affected

youki-dev

  • youki
CWE
CWE-61

UNIX Symbolic Link (Symlink) Following