RLSA-2026:11412

Source
https://errata.rockylinux.org/RLSA-2026:11412
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:11412.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:11412
Upstream
  • CVE-2026-25679
Published
2026-05-01T12:06:42.394267Z
Modified
2026-05-01T12:30:30.972131Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Important: yggdrasil-worker-package-manager security update
Details

yggdrasil-worker-package-manager is a simple package manager yggd worker. It knows how to install and remove packages, add, remove, enable and disable repositories, and does rudimentary detection of the host it is running on to guess the package manager to use. It only installs packages that match one of the provided allow-pattern regular expressions.

Security Fix(es):

  • net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / yggdrasil-worker-package-manager

Package

Name
yggdrasil-worker-package-manager
Purl
pkg:rpm/rocky-linux/yggdrasil-worker-package-manager?distro=rocky-linux-10&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.2.3-5.el10_1
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:11412.json"