Security update for dnsmasq
| Announcement ID: | SUSE-SU-2026:21640-1 |
|---|---|
| Release Date: | 2026-05-13T16:33:13Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves seven vulnerabilities, contains one feature and has four fixes can now be installed.
Description:
This update for dnsmasq fixes the following issues
Security issues:
- CVE-2026-2291: dnsmasq can be abused to record false cached data enabling DoS or attacker redirect (bsc#1258251).
- CVE-2026-4890: DoS vulnerability in the DNSSEC validation (bsc#1265001).
- CVE-2026-4891: heap-based out-of-bounds read vulnerability in the DNSSEC validation (bsc#1265002).
- CVE-2026-4892: heap-based out-of-bounds write vulnerability in the DHCPv6 implementation (bsc#1265003).
- CVE-2026-4893: information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks (bsc#1265004).
- CVE-2026-5172: buffer overflow in dnsmasq's extract_addresses() function (bsc#1265006).
- CVE-2026-6507: out-of-bounds write in DHCP BOOTREPLY processing can lead to denial of service (bsc#1262487).
Non security issues:
- aardvark-dns upstream tests make dnsmasq dump core (bsc#1247812).
- Drop rcFOO symlinks for CODE16 (jsc#PED-266.
- libnettle: update to 4.0 breaks dnsmasq and gnutls (bsc#1257934).
- unknown user or group: dnsmasq with latest proposed dnsmasq update when doing virsh net-start (bsc#1235517).
- Update to security release 2.92rel2.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-742=1
Package List:
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
- dnsmasq-debuginfo-2.92rel2-160000.1.1
- dnsmasq-2.92rel2-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2026-2291.html
- https://www.suse.com/security/cve/CVE-2026-4890.html
- https://www.suse.com/security/cve/CVE-2026-4891.html
- https://www.suse.com/security/cve/CVE-2026-4892.html
- https://www.suse.com/security/cve/CVE-2026-4893.html
- https://www.suse.com/security/cve/CVE-2026-5172.html
- https://www.suse.com/security/cve/CVE-2026-6507.html
- https://bugzilla.suse.com/show_bug.cgi?id=1235517
- https://bugzilla.suse.com/show_bug.cgi?id=1235834
- https://bugzilla.suse.com/show_bug.cgi?id=1247812
- https://bugzilla.suse.com/show_bug.cgi?id=1257934
- https://bugzilla.suse.com/show_bug.cgi?id=1258251
- https://bugzilla.suse.com/show_bug.cgi?id=1262487
- https://bugzilla.suse.com/show_bug.cgi?id=1265001
- https://bugzilla.suse.com/show_bug.cgi?id=1265002
- https://bugzilla.suse.com/show_bug.cgi?id=1265003
- https://bugzilla.suse.com/show_bug.cgi?id=1265004
- https://bugzilla.suse.com/show_bug.cgi?id=1265006
- https://jira.suse.com/browse/PED-266