[Dnsmasq-discuss] Security - IMPORTANT

Simon Kelley simon at thekelleys.org.uk
Mon May 11 17:18:25 UTC 2026


Today, 11th May 2026 CERT is releasing a set of six CVEs for serious 
security vulnerabilities in dnsmasq. These are all long-standing bugs 
which apply to pretty much all non-ancient versions. The CVE has been 
pre-disclosed to vendors, so hopefully they will be releasing patched 
versions of their dnsmasq packages in a timely manner.

Details and patches are available on the website at

https://thekelleys.org.uk/dnsmasq/CVE/

and I have made "2.92rel2" release of the current 2.92 dnsmasq stable 
release which is downloadable from the usual place and has had these 
patches applied.

At the same time, the commits which fix these bugs in the development 
tree will be uploaded. Some of these use the same patches as the 
backports, but some are more comprehensive re-writes to tackle root-causes.

There has been something of a revolution in AI-based security research, 
and I've spent a lot of time over the last couple of months dealing with 
bug reports, weeding duplicates (so many duplicates!) and triaging bugs 
into those which need vendor pre-disclosure and those which it's better 
to make public and fix immediately. Those judgements have been 
necessarily subjective, but given the number of times "good guys" have 
found these bugs, there's no doubt that "bad guys" have been able to do 
the same, so long embargoes seem kind of pointless. There's also the 
problem that the amount of time and effort, for all actors, needed to 
co-ordinate an embargo and provide backports is huge. I think the 
priority for most bugs is to fix them going forward, and have new 
dnsmasq releases as bug-free as possible. To this end, you may have 
noticed that there have been a lot of security-fix commits to the git 
repo in the weeks prior to this announcement.

I will shortly tag dnsmasq-2.93rc1 and the aim is to get a stable 2.93 
release done ASAP. Testing of release candidate by members here is 
important and I'd like to encourage anyone who can to do that as soon as 
they can. With luck, 2.93 could be out in a week or so.

The tsunami of AI-generated bug reports shows no signs of stopping, so 
it is likely that this process will have to be repeated again soon. 
There's a tension between getting as much as possible of the ongoing bug 
stream fixed in 2.93 and it's timely release. I plan to prioritise 
timeliness, and keep working after that as necessary.



Simon.








More information about the Dnsmasq-discuss mailing list