We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3931

Yggdrasil: local privilege escalation in yggdrasil



Description

A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.

Reserved 2025-04-25 | Published 2025-05-14 | Updated 2025-05-21 | Assigner redhat


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Handling of Insufficient Permissions or Privileges

Product status

Default status
affected

0:0.4.5-3.el10_0 before *
unaffected

Default status
affected

Default status
unaffected

Timeline

2025-04-25:Reported to Red Hat.
2025-05-14:Made public.

References

access.redhat.com/errata/RHSA-2025:7592 (RHSA-2025:7592) vendor-advisory

access.redhat.com/security/cve/CVE-2025-3931 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2362345 (RHBZ#2362345) issue-tracking

cve.org (CVE-2025-3931)

nvd.nist.gov (CVE-2025-3931)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3931

Support options

Helpdesk Chat, Email, Knowledgebase