RLSA-2026:11413

Source
https://errata.rockylinux.org/RLSA-2026:11413
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:11413.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:11413
Upstream
  • CVE-2026-25679
Published
2026-05-01T12:06:42.394267Z
Modified
2026-05-01T12:30:27.313219Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Important: yggdrasil security update
Details

yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.

Security Fix(es):

  • net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / yggdrasil

Package

Name
yggdrasil
Purl
pkg:rpm/rocky-linux/yggdrasil?distro=rocky-linux-10&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.4.8-4.el10_1
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:11413.json"