{"id":"RLSA-2026:17075","summary":"Important: yggdrasil security update","details":"yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child \"worker\" process, exchanging data with its worker processes through a D-Bus message broker.\n\nSecurity Fix(es):\n\n* golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)\n\n* crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-05-16T12:30:04.801571551Z","published":"2026-05-16T12:07:04.438254Z","upstream":["CVE-2026-32282","CVE-2026-32283"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2026:17075"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456336"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456338"}],"affected":[{"package":{"name":"yggdrasil","ecosystem":"Rocky Linux:10","purl":"pkg:rpm/rocky-linux/yggdrasil?distro=rocky-linux-10&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.8-5.el10_1"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2026:17075.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}