Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24859 | Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. |
Github GHSA |
GHSA-j26p-6wx7-f3pw | Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. |
Mon, 10 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Youki-dev
Youki-dev youki |
|
| CPEs | cpe:2.3:a:youki-dev:youki:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Youki-dev
Youki-dev youki |
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Youki Project
Youki Project youki |
|
| Vendors & Products |
Youki Project
Youki Project youki |
Thu, 14 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5. | |
| Title | Youki Symlink Following Vulnerability | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-14T19:26:11.541Z
Reserved: 2025-07-31T17:23:33.472Z
Link: CVE-2025-54867
Updated: 2025-08-14T18:43:09.441Z
Status : Analyzed
Published: 2025-08-14T16:15:39.933
Modified: 2025-11-10T17:50:01.987
Link: CVE-2025-54867
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:10Z
EUVD
Github GHSA