Skip to main content

CVE-2025-54867: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki

High
VulnerabilityCVE-2025-54867cvecve-2025-54867cwe-61
Published: Thu Aug 14 2025 (08/14/2025, 16:08:00 UTC)
Source: CVE Database V5
Vendor/Project: youki-dev
Product: youki

Description

Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-31T17:23:33.472Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689e0c2dad5a09ad005ca280

Added to database: 8/14/2025, 4:17:49 PM

Last updated: 8/14/2025, 4:17:49 PM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats