MGASA-2026-0135

Source
https://advisories.mageia.org/MGASA-2026-0135.html
Import Source
https://advisories.mageia.org/MGASA-2026-0135.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2026-0135
Upstream
  • CVE-2026-2291
  • CVE-2026-4890
  • CVE-2026-4891
  • CVE-2026-4892
  • CVE-2026-4893
  • CVE-2026-5172
Published
2026-05-14T02:43:25Z
Modified
2026-05-14T02:45:20.443426Z
Summary
Updated dnsmasq packages fix security vulnerabilities
Details

CVE-2026-2291: dnsmasqs extractname() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS. CVE-2026-4890: A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet. CVE-2026-4891: A heap-based out-of-bounds read vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet. CVE-2026-4892: A heap-based out-of-bounds write vulnerability in the DHCPv6 implementation of dnsmasq allows local attackers to execute arbitrary code with root privileges via a crafted DHCPv6 packet. CVE-2026-4893: An information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks via a crafted DNS packet with RFC 7871 client subnet information. CVE-2026-5172: A buffer overflow in dnsmasq’s extractaddresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.

References
Credits

Affected packages

Mageia:9 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/mageia/dnsmasq?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.92rel2-1.mga9

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2026-0135.json"