CVE-2026-4891

NameCVE-2026-4891
DescriptionA heap-based out-of-bounds read vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6264-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dnsmasq (PTS)bullseye2.85-1vulnerable
bullseye (security)2.85-1+deb11u1vulnerable
bookworm2.90-4~deb12u1vulnerable
bookworm (security)2.90-4~deb12u2fixed
trixie2.91-1vulnerable
trixie (security)2.91-1+deb13u1fixed
forky2.92-4vulnerable
sid2.92-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dnsmasqsourcebookworm2.90-4~deb12u2DSA-6264-1
dnsmasqsourcetrixie2.91-1+deb13u1DSA-6264-1
dnsmasqsource(unstable)2.92-5

Notes

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html
https://xchglabs.com/blog/dnsmasq-five-cves.html
Fixed by: https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=788b4e0f6c05217981b512bed4e5fea6f8855d01 (v2.93rc1)

Search for package or bug name: Reporting problems