RLSA-2025:7592

Source
https://errata.rockylinux.org/RLSA-2025:7592
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:7592.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:7592
Upstream
  • CVE-2025-3931
Published
2025-10-03T19:56:45.270310Z
Modified
2025-10-08T17:12:39.970111Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: yggdrasil security update
Details

yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.

Security Fix(es):

  • yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / yggdrasil

Package

Name
yggdrasil
Purl
pkg:rpm/rocky-linux/yggdrasil?distro=rocky-linux-10-0&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.4.5-3.el10_0