|
|
Message-ID: <2f03461f-afa3-4782-beb6-0e0f597cf83a@oracle.com>
Date: Mon, 11 May 2026 11:28:48 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: dnsmasq vulnerabilities, including attacker DNS
redirect, privilege escalation, and heap manipulation
On 5/11/26 11:11, Alan Coopersmith wrote:
> https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html
> announces:
>> and I have made "2.92rel2" release of the current 2.92 dnsmasq stable release
>> which is downloadable from the usual place and has had these patches applied.
> https://www.kb.cert.org/vuls/id/471747 provides additional details:
>> dnsmasq has released version 2.93 to fix the above vulnerabilities, and
>> various vendors have published patches to address individual remediations.
CERT has now corrected their advisory to list version 2.92rel2 as well.
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.