CVE-2025-54867

The Rust Runtime That Blinked: Breaking Out of Youki via Symlinks

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·6 min read·3 visits

Executive Summary (TL;DR)

The 'youki' container runtime failed to validate destination paths when mounting /proc and /sys. A malicious image containing symlinks at these locations can trick the runtime into writing mounts to the host filesystem, leading to container escape.

While Rust guarantees memory safety, it cannot protect developers from logic errors. A critical vulnerability in the 'youki' container runtime allows malicious container images to trick the runtime into mounting sensitive pseudo-filesystems onto the host machine via symbolic links, effectively bypassing container isolation.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.0/ 10
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.03%
Top 100% most exploited

Affected Systems

youki container runtime < 0.5.5

Affected Versions Detail

Product
Affected Versions
Fixed Version
youki
youki-dev
< 0.5.50.5.5
AttributeDetail
CWECWE-61 (Symlink Following)
CVSS7.0 (High)
Attack VectorLocal (via Malicious Image)
PrivilegesLow (Container User)
ImpactContainer Escape / Host FS Access
Patchyouki v0.5.5
CWE-61
Unix Symbolic Link (Symlink) Following

The software does not properly verify that a path is a symbolic link before writing to it, allowing for file manipulation outside the intended directory.

Vulnerability Timeline

Patch Committed (v0.5.5)
2025-01-15
CVE Published
2025-01-20