Jan 1, 2026·6 min read·5 visits
The 'youki' container runtime failed to validate destination paths when mounting /proc and /sys. A malicious image containing symlinks at these locations can trick the runtime into writing mounts to the host filesystem, leading to container escape.
While Rust guarantees memory safety, it cannot protect developers from logic errors. A critical vulnerability in the 'youki' container runtime allows malicious container images to trick the runtime into mounting sensitive pseudo-filesystems onto the host machine via symbolic links, effectively bypassing container isolation.
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
youki youki-dev | < 0.5.5 | 0.5.5 |
| Attribute | Detail |
|---|---|
| CWE | CWE-61 (Symlink Following) |
| CVSS | 7.0 (High) |
| Attack Vector | Local (via Malicious Image) |
| Privileges | Low (Container User) |
| Impact | Container Escape / Host FS Access |
| Patch | youki v0.5.5 |
The software does not properly verify that a path is a symbolic link before writing to it, allowing for file manipulation outside the intended directory.