[ALSA-2026:17075] Important: yggdrasil security update
Type:
security
Severity:
important
Release date:
2026-05-14
Description:
yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker. Security Fix(es): * golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282) * crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 yggdrasil-0.4.8-5.el10_1.aarch64.rpm 37a22eb622ef51ca31762f2f0979716e9fa051cc37d993a983bf5d8191263754
aarch64 yggdrasil-devel-0.4.8-5.el10_1.aarch64.rpm 7784054f4ebbe5fab3429b4e3b67e5845b69da57d28e11fe4fb4ccf7ca7f5aea
ppc64le yggdrasil-devel-0.4.8-5.el10_1.ppc64le.rpm 1e7ca904519723e142bcfbaa2979625205e5e19c79c34e64bc98cb97b6e3876f
ppc64le yggdrasil-0.4.8-5.el10_1.ppc64le.rpm ab9114a1fd41072ed023e14cd7fc43fb24429348c074b975ab6a41286fa7c4b0
s390x yggdrasil-0.4.8-5.el10_1.s390x.rpm 7bd9b3465696119ca252b27aa2d15d030203715777aba990f0ee284c96423407
s390x yggdrasil-devel-0.4.8-5.el10_1.s390x.rpm 86bfc6ceca8b13ba6fda22becc022cb1f112ab3e4fbfe8b8b4528053c96a6945
x86_64 yggdrasil-0.4.8-5.el10_1.x86_64.rpm 7899203eef8717a99a0aaf53cb581f2e2c6a948efd6f4988b759295e86842f92
x86_64 yggdrasil-devel-0.4.8-5.el10_1.x86_64.rpm 7b5cbbc55c3fa57106fdd181be350b953d421ef6d55b925d5546af106d2d11e5
x86_64_v2 yggdrasil-devel-0.4.8-5.el10_1.x86_64_v2.rpm 1508412950898b216f1f936ba49fab51929ebf5c8df33b0312db39494f40d2af
x86_64_v2 yggdrasil-0.4.8-5.el10_1.x86_64_v2.rpm bfaa15c3a4e85ea349f19abce70435202c0ea16194a061a13b2e49890263190f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.