CVE-2026-2291
CVE-2026-2291
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th
dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.
| Vendor | dnsmasq |
| Product | dnsmasq |
| Published | May 11, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for dnsmasq dnsmasq
Be the first to know when new high vulnerabilities affecting dnsmasq dnsmasq are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
dnsmasq / dnsmasq
2.92rel2
References
suse.com: https://www.suse.com/security/cve/CVE-2026-2291.html kb.cert.org: https://www.kb.cert.org/vuls/id/471747 thekelleys.org.uk: https://thekelleys.org.uk/dnsmasq/CVE/ lists.thekelleys.org.uk: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html github.com: https://github.com/NixOS/nixpkgs/pull/519082 github.com: https://github.com/NixOS/nixpkgs/pull/519093 github.com: https://github.com/pi-hole/FTL/releases/tag/v6.6.2