VYPR
High severity7.8NVD Advisory· Published May 14, 2025· Updated Apr 15, 2026

CVE-2025-3931

CVE-2025-3931

Description

A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages.

This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/redhatinsights/yggdrasilGo
<= 0.4.6

Patches

1
196d0cbea42f

fix: Only root user can call use com.redhat.Yggdrasil1

https://github.com/RedHatInsights/yggdrasilJiri HnidekApr 30, 2025via ghsa
1 file changed · +2 2
  • data/dbus/yggd.conf.in+2 2 modified
    @@ -15,8 +15,8 @@
         <allow send_destination="com.redhat.Yggdrasil1.Dispatcher1" />
       </policy>
     
    -  <policy context="default">
    -    <!-- Anyone can send messages to the Yggdrasil1 destination. -->
    +  <policy user="root">
    +    <!-- Only root can send messages to the Yggdrasil1 destination. -->
         <allow send_destination="com.redhat.Yggdrasil1" />
       </policy>
     </busconfig>
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.