Bug 2458517 (CVE-2026-4891) - CVE-2026-4891 dnsmasq: RRSIG rdlen underflow leading to heap OOB read
Summary: CVE-2026-4891 dnsmasq: RRSIG rdlen underflow leading to heap OOB read
Keywords:
Status: NEW
Alias: CVE-2026-4891
Deadline: 2026-05-09
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-14 22:45 UTC by OSIDB Bzimport
Modified: 2026-05-19 21:41 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:19158 0 None None None 2026-05-19 16:10:33 UTC
Red Hat Product Errata RHSA-2026:19373 0 None None None 2026-05-19 21:41:11 UTC

Description OSIDB Bzimport 2026-04-14 22:45:13 UTC
In validate_rrset() at dnssec.c:546, sig_len is calculated as rdlen - (p - psav) without checking that rdlen is large enough to cover the fixed RRSIG fields and signer name. A crafted RRSIG with a short rdlen makes sig_len go negative, which when passed as a size parameter becomes a huge unsigned value, causing a massive heap OOB read. Fix: check sig_len <= 0 and return STAT_BOGUS before using it.

Comment 2 errata-xmlrpc 2026-05-19 16:10:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19158 https://access.redhat.com/errata/RHSA-2026:19158

Comment 3 errata-xmlrpc 2026-05-19 21:41:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19373 https://access.redhat.com/errata/RHSA-2026:19373


Note You need to log in before you can comment on or make changes to this bug.