RLSA-2026:17075

Source
https://errata.rockylinux.org/RLSA-2026:17075
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:17075.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:17075
Upstream
Published
2026-05-16T12:07:04.438254Z
Modified
2026-05-16T12:30:04.801571551Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Important: yggdrasil security update
Details

yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.

Security Fix(es):

  • golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)

  • crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:10 / yggdrasil

Package

Name
yggdrasil
Purl
pkg:rpm/rocky-linux/yggdrasil?distro=rocky-linux-10&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.4.8-5.el10_1
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:17075.json"