{"id":"RLSA-2025:7592","summary":"Important: yggdrasil security update","details":"yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child \"worker\" process, exchanging data with its worker processes through a D-Bus message broker.\n\nSecurity Fix(es):\n\n* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2025-10-08T17:12:39.970111Z","published":"2025-10-03T19:56:45.270310Z","upstream":["CVE-2024-45336","CVE-2025-3931"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:7592"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2341751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362345"}],"affected":[{"package":{"name":"yggdrasil","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/yggdrasil?distro=rocky-linux-10-0&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.5-3.el10_0"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:7592.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}