CVE-2026-4891
Description
A heap-based out-of-bounds read vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A heap out-of-bounds read in dnsmasq's DNSSEC validation of crafted RRSIG records allows a remote attacker to crash the service.
Vulnerability
A heap-based out-of-bounds read vulnerability exists in the DNSSEC validation code of dnsmasq versions prior to 2.92rel2. The flaw is triggered when a DNS packet declares an rdlen smaller than the fixed RRSIG header plus the signer's name, causing a negative signature length and a subsequent out-of-bounds read [3].
Exploitation
An unauthenticated remote attacker can exploit this issue by sending a specially crafted DNS packet with a malformed RRSIG resource record. No prior authentication or local network access is required; the attacker only needs to be able to send DNS queries to the vulnerable dnsmasq instance [1][3]. The bug is reachable before RRSIG validation, so no valid DNSSEC signatures are necessary to trigger the condition [3].
Impact
A successful exploit leads to a denial of service (DoS) — crash) of the dnsmasq process, interrupting DNS forwarding and DHCP services for all clients relying on that instance [1][3]. According to advisory information, the crash is reliably reproducible, making the vulnerability a practical vector for disrupting DNS services [3].
Mitigation
The dnsmasq project has released version 2.92rel2 which patches this and five other critical security issues [1][2][4]. Upstream distributions and downstream projects such as Pi-hole have already incorporated the fix within their packages [3]. Users are strongly advised to update to the patched version immediately.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
4- ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and MoreThe Hacker News · May 18, 2026
- Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploitedHelp Net Security · May 17, 2026
- Researchers open-source a Wi-Fi cyber range for security trainingHelp Net Security · May 13, 2026
- APT28 exploit routers to enable DNS hijacking operationsNCSC UK · Apr 7, 2026