Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Youki Project Youki Project youki | |
| Vendors & Products | Youki Project Youki Project youki | 
Thu, 14 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 14 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5. | |
| Title | Youki Symlink Following Vulnerability | |
| Weaknesses | CWE-61 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-14T16:08:00.622Z
Updated: 2025-08-14T19:26:11.541Z
Reserved: 2025-07-31T17:23:33.472Z
Link: CVE-2025-54867
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-14T18:43:09.441Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-14T16:15:39.933
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-54867
 Redhat
                        Redhat
                    No data.