Input validation error in Dnsmasq - CVE-2026-4893
Published: May 12, 2026
Dnsmasq
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass client subnet source validation.
The vulnerability exists due to improper input validation in check_source() handling in process_reply() when processing DNS replies with the --add-subnet feature enabled. A remote attacker can send a specially crafted DNS reply to bypass client subnet source validation.
Only configurations with --add-subnet enabled are vulnerable.