Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Red Hat Yggdrasil Software Has a Security Flaw That Can Be Exploited
RHSA-2026:3506
Summary
A security issue was discovered in Yggdrasil, a software package used by some Red Hat products. This issue allows an attacker to potentially take control of a system by exploiting a weakness in Yggdrasil. Red Hat has released an update to fix the issue, and it is recommended that users apply it as soon as possible to prevent any potential risks.
What to do
- Update redhat yggdrasil to version 0:0.4.7-2.el10_0.
- Update redhat yggdrasil-debuginfo to version 0:0.4.7-2.el10_0.
- Update redhat yggdrasil-debugsource to version 0:0.4.7-2.el10_0.
- Update redhat yggdrasil-devel to version 0:0.4.7-2.el10_0.
- Update redhat yggdrasil-examples-debuginfo to version 0:0.4.7-2.el10_0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | yggdrasil | <= 0:0.4.7-2.el10_0 | 0:0.4.7-2.el10_0 |
| redhat | yggdrasil-debuginfo | <= 0:0.4.7-2.el10_0 | 0:0.4.7-2.el10_0 |
| redhat | yggdrasil-debugsource | <= 0:0.4.7-2.el10_0 | 0:0.4.7-2.el10_0 |
| redhat | yggdrasil-devel | <= 0:0.4.7-2.el10_0 | 0:0.4.7-2.el10_0 |
| redhat | yggdrasil-examples-debuginfo | <= 0:0.4.7-2.el10_0 | 0:0.4.7-2.el10_0 |
Original title
Red Hat Security Advisory: yggdrasil security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3506 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418462 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437111 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3506.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61729 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61729 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61729 Vendor Advisory
- https://go.dev/cl/725920 Third Party Advisory
- https://go.dev/issue/76445 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2025-4155 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-68121 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68121 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68121 Vendor Advisory
- https://go.dev/cl/737700 Third Party Advisory
- https://go.dev/issue/77217 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/K09ubi9FQFk Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4337 Vendor Advisory
Published: 2 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026