Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24859 | Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. |
Github GHSA |
GHSA-j26p-6wx7-f3pw | Youki: If /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Youki Project
Youki Project youki |
|
| Vendors & Products |
Youki Project
Youki Project youki |
Thu, 14 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5. | |
| Title | Youki Symlink Following Vulnerability | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-14T19:26:11.541Z
Reserved: 2025-07-31T17:23:33.472Z
Link: CVE-2025-54867
Updated: 2025-08-14T18:43:09.441Z
Status : Awaiting Analysis
Published: 2025-08-14T16:15:39.933
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-54867
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:10Z
EUVD
Github GHSA