CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

· security · Source ↗

TLDR

  • Simon Kelley released dnsmasq 2.92rel2 patching six CERT CVEs affecting nearly all non-ancient versions; 2.93 targets release within a week.

Key Takeaways

  • Six CVEs cover long-standing bugs; patches and details at thekelleys.org.uk/dnsmasq/CVE/; vendors were pre-disclosed and should ship updates soon.
  • AI-based security research triggered a flood of bug reports, many duplicates; Kelley spent months triaging before coordinating this disclosure.
  • Long embargoes deemed pointless given how many independent researchers found the same bugs, implying adversaries likely did too.
  • 2.93rc1 tagging imminent; community testing of the release candidate is explicitly requested to accelerate a stable release.
  • Kelley warns the AI-generated bug report tsunami will continue, meaning this disclosure cycle will likely repeat.

Hacker News Comment Review

  • OpenWRT and DD-WRT are actively patching but have not yet shipped releases, leaving a large window of exposure on consumer and embedded routers.
  • Commenters debated whether dnsmasq’s C codebase justifies a rewrite in Rust or Go, with counterargument that AI-assisted auditing is improving C safety instead.
  • Debian’s stable packaging process drew criticism for shipping outdated dnsmasq builds; others clarified the correct fix is getting newer versions into testing first.

Notable Comments

  • @aftbit: OpenWRT confirmed working on patches but no build shipped yet as of posting.
  • @882542F3884314B: Links to xchglabs.com writeup covering five of the CVEs with technical detail.

Original | Discuss on HN