Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
References
Configurations
History
10 Nov 2025, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:youki-dev:youki:*:*:*:*:*:*:*:* | |
| References | () https://github.com/youki-dev/youki/commit/0d9b4f2aa5ceaf988f3eb568711d2acf0a4ace37 - Patch | |
| References | () https://github.com/youki-dev/youki/releases/tag/v0.5.5 - Release Notes | |
| References | () https://github.com/youki-dev/youki/security/advisories/GHSA-j26p-6wx7-f3pw - Vendor Advisory | |
| First Time |
Youki-dev
Youki-dev youki |
|
| Summary |
|
14 Aug 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-14 16:15
Updated : 2025-11-10 17:50
NVD link : CVE-2025-54867
Mitre link : CVE-2025-54867
CVE.ORG link : CVE-2025-54867
JSON object : View
Products Affected
youki-dev
- youki
CWE
CWE-61
UNIX Symbolic Link (Symlink) Following
