RHSA-2026:19373

Vulnerability from csaf_redhat - Published: 2026-05-19 21:55 - Updated: 2026-05-20 02:44
Summary
Red Hat Security Advisory: dnsmasq security update
Severity
Important
Notes
Topic: An update for dnsmasq is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: dnsmasq: heap buffer overflow in cache via NAME_ESCAPE expansion (CVE-2026-2291) * dnsmasq: NSEC bitmap parsing infinite loop (CVE-2026-4890) * dnsmasq: RRSIG rdlen underflow leading to heap OOB read (CVE-2026-4891) * dnsmasq: DHCPv6 CLID buffer overflow in helper process (CVE-2026-4892) * dnsmasq: Broken ECS source validation bypass (CVE-2026-4893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A heap buffer overflow was discovered in dnsmasq's DNS cache. When processing DNS responses, dnsmasq expands certain characters into longer escape sequences, but the cache buffer is not sized to hold the expanded result. A specially crafted DNS response can overflow this buffer, potentially crashing the dnsmasq process or poisoning DNS cache records.

CWE-131 - Incorrect Calculation of Buffer Size
Affected products
Product Identifier Version Remediation
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Threats
Impact Moderate

A denial of service vulnerability was discovered in dnsmasq's DNSSEC validation. When parsing NSEC and NSEC3 bitmap records, the window iteration logic fails to account for the 2-byte window header when advancing through the bitmap data. A specially crafted DNS response with a zero-length bitmap can cause an infinite loop, making dnsmasq unresponsive to all queries.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Affected products
Product Identifier Version Remediation
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Threats
Impact Important

A heap out-of-bounds read vulnerability was discovered in dnsmasq's DNSSEC validation. When processing RRSIG records, dnsmasq calculates the signature length by subtracting the fixed field size from the record's declared data length. A crafted RRSIG record with a data length smaller than the fixed fields causes this calculation to underflow, potentially resulting in an out-of-bounds read and process crash.

CWE-125 - Out-of-bounds Read
Affected products
Product Identifier Version Remediation
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Threats
Impact Important

A heap buffer overflow was discovered in dnsmasq's DHCP script helper process. When processing DHCPv6 client identifiers (CLIDs), the helper hex-encodes the raw CLID bytes into a fixed-size buffer without length validation. Since DHCPv6 CLIDs can be up to 65,535 bytes, a crafted DHCPv6 packet can overflow the buffer with attacker-controlled content. The helper process runs with root privileges.

CWE-122 - Heap-based Buffer Overflow
Affected products
Product Identifier Version Remediation
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Threats
Impact Important

A validation bypass was discovered in dnsmasq's RFC 7871 client subnet (ECS) handling. When verifying ECS source information in DNS responses, dnsmasq passes the OPT record length instead of the full packet length to the validation function.This causes all internal bounds checks to fail, completely bypassing ECS source validation and allowing an attacker to spoof client subnet information.

CWE-20 - Improper Input Validation
Affected products
Product Identifier Version Remediation
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x
Vendor Fix fix
Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64
Vendor Fix fix
Threats
Impact Moderate
References
URL Category
https://access.redhat.com/errata/RHSA-2026:19373 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=2439088 external
https://bugzilla.redhat.com/show_bug.cgi?id=2458516 external
https://bugzilla.redhat.com/show_bug.cgi?id=2458517 external
https://bugzilla.redhat.com/show_bug.cgi?id=2458518 external
https://bugzilla.redhat.com/show_bug.cgi?id=2458519 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2026-2291 self
https://bugzilla.redhat.com/show_bug.cgi?id=2439088 external
https://www.cve.org/CVERecord?id=CVE-2026-2291 external
https://nvd.nist.gov/vuln/detail/CVE-2026-2291 external
https://access.redhat.com/security/cve/CVE-2026-4890 self
https://bugzilla.redhat.com/show_bug.cgi?id=2458516 external
https://www.cve.org/CVERecord?id=CVE-2026-4890 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4890 external
https://lists.thekelleys.org.uk/pipermail/dnsmasq… external
https://access.redhat.com/security/cve/CVE-2026-4891 self
https://bugzilla.redhat.com/show_bug.cgi?id=2458517 external
https://www.cve.org/CVERecord?id=CVE-2026-4891 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4891 external
https://access.redhat.com/security/cve/CVE-2026-4892 self
https://bugzilla.redhat.com/show_bug.cgi?id=2458518 external
https://www.cve.org/CVERecord?id=CVE-2026-4892 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4892 external
https://access.redhat.com/security/cve/CVE-2026-4893 self
https://bugzilla.redhat.com/show_bug.cgi?id=2458519 external
https://www.cve.org/CVERecord?id=CVE-2026-4893 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4893 external
Acknowledgments
NIST Andrew Fasano

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: dnsmasq: heap buffer overflow in cache via NAME_ESCAPE expansion (CVE-2026-2291)\n\n* dnsmasq: NSEC bitmap parsing infinite loop (CVE-2026-4890)\n\n* dnsmasq: RRSIG rdlen underflow leading to heap OOB read (CVE-2026-4891)\n\n* dnsmasq: DHCPv6 CLID buffer overflow in helper process (CVE-2026-4892)\n\n* dnsmasq: Broken ECS source validation bypass (CVE-2026-4893)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:19373",
        "url": "https://access.redhat.com/errata/RHSA-2026:19373"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2439088",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439088"
      },
      {
        "category": "external",
        "summary": "2458516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458516"
      },
      {
        "category": "external",
        "summary": "2458517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458517"
      },
      {
        "category": "external",
        "summary": "2458518",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458518"
      },
      {
        "category": "external",
        "summary": "2458519",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458519"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_19373.json"
      }
    ],
    "title": "Red Hat Security Advisory: dnsmasq security update",
    "tracking": {
      "current_release_date": "2026-05-20T02:44:31+00:00",
      "generator": {
        "date": "2026-05-20T02:44:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.8.0"
        }
      },
      "id": "RHSA-2026:19373",
      "initial_release_date": "2026-05-19T21:55:17+00:00",
      "revision_history": [
        {
          "date": "2026-05-19T21:55:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-19T21:55:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-05-20T02:44:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.8.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsmasq-0:2.85-18.el9_8.1.aarch64",
                "product": {
                  "name": "dnsmasq-0:2.85-18.el9_8.1.aarch64",
                  "product_id": "dnsmasq-0:2.85-18.el9_8.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq@2.85-18.el9_8.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
                "product": {
                  "name": "dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
                  "product_id": "dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils@2.85-18.el9_8.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
                "product": {
                  "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
                  "product_id": "dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.85-18.el9_8.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
                "product": {
                  "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
                  "product_id": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.85-18.el9_8.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
                "product": {
                  "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
                  "product_id": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.85-18.el9_8.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsmasq-0:2.85-18.el9_8.1.src",
                "product": {
                  "name": "dnsmasq-0:2.85-18.el9_8.1.src",
                  "product_id": "dnsmasq-0:2.85-18.el9_8.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq@2.85-18.el9_8.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsmasq-0:2.85-18.el9_8.1.ppc64le",
                "product": {
                  "name": "dnsmasq-0:2.85-18.el9_8.1.ppc64le",
                  "product_id": "dnsmasq-0:2.85-18.el9_8.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq@2.85-18.el9_8.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
                "product": {
                  "name": "dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
                  "product_id": "dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils@2.85-18.el9_8.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
                "product": {
                  "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
                  "product_id": "dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.85-18.el9_8.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                "product": {
                  "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                  "product_id": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.85-18.el9_8.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                "product": {
                  "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                  "product_id": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.85-18.el9_8.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsmasq-0:2.85-18.el9_8.1.x86_64",
                "product": {
                  "name": "dnsmasq-0:2.85-18.el9_8.1.x86_64",
                  "product_id": "dnsmasq-0:2.85-18.el9_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq@2.85-18.el9_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
                "product": {
                  "name": "dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
                  "product_id": "dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils@2.85-18.el9_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
                "product": {
                  "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
                  "product_id": "dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.85-18.el9_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
                "product": {
                  "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
                  "product_id": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.85-18.el9_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64",
                "product": {
                  "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64",
                  "product_id": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.85-18.el9_8.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsmasq-0:2.85-18.el9_8.1.s390x",
                "product": {
                  "name": "dnsmasq-0:2.85-18.el9_8.1.s390x",
                  "product_id": "dnsmasq-0:2.85-18.el9_8.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq@2.85-18.el9_8.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
                "product": {
                  "name": "dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
                  "product_id": "dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils@2.85-18.el9_8.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
                "product": {
                  "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
                  "product_id": "dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.85-18.el9_8.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
                "product": {
                  "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
                  "product_id": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.85-18.el9_8.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
                "product": {
                  "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
                  "product_id": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.85-18.el9_8.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-0:2.85-18.el9_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64"
        },
        "product_reference": "dnsmasq-0:2.85-18.el9_8.1.aarch64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-0:2.85-18.el9_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le"
        },
        "product_reference": "dnsmasq-0:2.85-18.el9_8.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-0:2.85-18.el9_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x"
        },
        "product_reference": "dnsmasq-0:2.85-18.el9_8.1.s390x",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-0:2.85-18.el9_8.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src"
        },
        "product_reference": "dnsmasq-0:2.85-18.el9_8.1.src",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-0:2.85-18.el9_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64"
        },
        "product_reference": "dnsmasq-0:2.85-18.el9_8.1.x86_64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64"
        },
        "product_reference": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le"
        },
        "product_reference": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x"
        },
        "product_reference": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64"
        },
        "product_reference": "dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64"
        },
        "product_reference": "dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le"
        },
        "product_reference": "dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x"
        },
        "product_reference": "dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64"
        },
        "product_reference": "dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-0:2.85-18.el9_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64"
        },
        "product_reference": "dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le"
        },
        "product_reference": "dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-0:2.85-18.el9_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x"
        },
        "product_reference": "dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-0:2.85-18.el9_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64"
        },
        "product_reference": "dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64"
        },
        "product_reference": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le"
        },
        "product_reference": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x"
        },
        "product_reference": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        },
        "product_reference": "dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64",
        "relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Andrew Fasano"
          ],
          "organization": "NIST"
        }
      ],
      "cve": "CVE-2026-2291",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2026-02-11T19:49:33.263000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2439088"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow was discovered in dnsmasq\u0027s DNS cache. When processing DNS responses, dnsmasq expands certain characters into longer escape sequences, but the cache buffer is not sized to hold the expanded result. A specially crafted DNS response can overflow this buffer, potentially crashing the dnsmasq process or poisoning DNS cache records.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "dnsmasq: dnsmasq: heap buffer overflow in cache via NAME_ESCAPE expansion",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates this issue as Moderate rather than Important. While DNS cache poisoning is possible, a process crash is the most likely outcome of a successful exploit. Also, standard upstream DNS resolvers reject the malformed responses before they reach dnsmasq, limiting exploitation to uncommon configurations where dnsmasq forwards directly to an attacker-controlled server.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-2291"
        },
        {
          "category": "external",
          "summary": "RHBZ#2439088",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439088"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-2291",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-2291"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2291",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2291"
        }
      ],
      "release_date": "2026-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T21:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:19373"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "dnsmasq: dnsmasq: heap buffer overflow in cache via NAME_ESCAPE expansion"
    },
    {
      "cve": "CVE-2026-4890",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2026-04-14T22:32:21.880000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2458516"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service vulnerability was discovered in dnsmasq\u0027s DNSSEC validation. When parsing NSEC and NSEC3 bitmap records, the window iteration logic fails to account for the 2-byte window header when advancing through the bitmap data. A specially crafted DNS response with a zero-length bitmap can cause an infinite loop, making dnsmasq unresponsive to all queries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "dnsmasq: NSEC bitmap parsing infinite loop",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects deployments with DNSSEC validation enabled (--dnssec). The flaw is reachable before RRSIG signature validation, meaning no valid DNSSEC signatures are required to trigger it. However, the primary impact is limited to denial of service.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4890"
        },
        {
          "category": "external",
          "summary": "RHBZ#2458516",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458516"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4890",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4890"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4890",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4890"
        },
        {
          "category": "external",
          "summary": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html",
          "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html"
        }
      ],
      "release_date": "2026-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T21:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:19373"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "dnsmasq: NSEC bitmap parsing infinite loop"
    },
    {
      "cve": "CVE-2026-4891",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2026-04-14T22:39:35.826000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2458517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap out-of-bounds read vulnerability was discovered in dnsmasq\u0027s DNSSEC validation. When processing RRSIG records, dnsmasq calculates the signature length by subtracting the fixed field size from the record\u0027s declared data length. A crafted RRSIG record with a data length smaller than the fixed fields causes this calculation to underflow, potentially resulting in an out-of-bounds read and process crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "dnsmasq: RRSIG rdlen underflow leading to heap OOB read",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2458517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4891"
        },
        {
          "category": "external",
          "summary": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html",
          "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html"
        }
      ],
      "release_date": "2026-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T21:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:19373"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "dnsmasq: RRSIG rdlen underflow leading to heap OOB read"
    },
    {
      "cve": "CVE-2026-4892",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2026-04-14T22:44:58.432000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2458518"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow was discovered in dnsmasq\u0027s DHCP script helper process. When processing DHCPv6 client identifiers (CLIDs), the helper hex-encodes the raw CLID bytes into a fixed-size buffer without length validation. Since DHCPv6 CLIDs can be up to 65,535 bytes, a crafted DHCPv6 packet can overflow the buffer with attacker-controlled content. The helper process runs with root privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "dnsmasq: DHCPv6 CLID buffer overflow in helper process",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates this as Important. The overflow occurs in a root-privileged helper process with attacker-controlled content, and the `--dhcp-script` option is enabled by default in libvirt virtual network configurations, which affects RHEL systems using virt-manager, virt-install, or cockpit-machines. Exploitation requires the attacker to send crafted DHCPv6 packets from within the virtual network, meaning a malicious VM guest could potentially exploit this for host-level code execution as root.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4892"
        },
        {
          "category": "external",
          "summary": "RHBZ#2458518",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458518"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4892",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4892"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4892",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4892"
        },
        {
          "category": "external",
          "summary": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html",
          "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html"
        }
      ],
      "release_date": "2026-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T21:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:19373"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "dnsmasq: DHCPv6 CLID buffer overflow in helper process"
    },
    {
      "cve": "CVE-2026-4893",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2026-04-14T22:50:18.517000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2458519"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A validation bypass was discovered in dnsmasq\u0027s RFC 7871 client subnet (ECS) handling. When verifying ECS source information in DNS responses, dnsmasq passes the OPT record length instead of the full packet length to the validation function.This causes all internal bounds checks to fail, completely bypassing ECS source validation and allowing an attacker to spoof client subnet information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "dnsmasq: Broken ECS source validation bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat rates this as Moderate. This issue affects deployments with the `--add-subnet` option enabled. The impact is limited to bypassing ECS source validation, which could allow cache manipulation scoped to specific subnets or minor information disclosure about network topology.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
          "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4893"
        },
        {
          "category": "external",
          "summary": "RHBZ#2458519",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458519"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4893",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4893"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4893",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4893"
        },
        {
          "category": "external",
          "summary": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html",
          "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html"
        }
      ],
      "release_date": "2026-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T21:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:19373"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.src",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debuginfo-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-debugsource-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-0:2.85-18.el9_8.1.x86_64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.aarch64",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.ppc64le",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.s390x",
            "AppStream-9.8.0.Z.MAIN.EUS:dnsmasq-utils-debuginfo-0:2.85-18.el9_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "dnsmasq: Broken ECS source validation bypass"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…