dnsmasq hits six critical vulnerabilities
Six new CVEs for the ubiquitous dnsmasq network tool expose millions of systems to remote code execution and cache poisoning. Users should upgrade to version 2.92rel2 immediately to patch these long-standing memory safety bugs identified through AI-assisted research.
The maintainer's report of a "tsunami" of AI-generated bug reports signals a new era where legacy C codebases are under constant, automated scrutiny.
- –Six CVEs range from Denial of Service to critical Remote Code Execution (RCE) via DHCPv6
- –Affects almost all non-ancient versions, highlighting the risk of long-term "silent" bugs in core network infrastructure
- –The discovery via AI fuzzing suggests that the window for manual vulnerability triage is closing as exploit discovery democratizes
- –Immediate patches are available in 2.92rel2, with a fast-tracked 2.93 release focusing on architectural root causes
- –Major downstream projects like Pi-hole and various Linux distributions have already begun pushing emergency updates
DISCOVERED
1d ago
2026-05-12
PUBLISHED
1d ago
2026-05-12
RELEVANCE
AUTHOR
chizhik-pyzhik