๐Ÿ” CVE Alert

CVE-2026-2291

HIGH 7.3

CVE-2026-2291

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th

dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.

Vendor dnsmasq
Product dnsmasq
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for dnsmasq dnsmasq

Be the first to know when new high vulnerabilities affecting dnsmasq dnsmasq are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

dnsmasq / dnsmasq
2.92rel2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
suse.com: https://www.suse.com/security/cve/CVE-2026-2291.html kb.cert.org: https://www.kb.cert.org/vuls/id/471747 thekelleys.org.uk: https://thekelleys.org.uk/dnsmasq/CVE/ lists.thekelleys.org.uk: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html github.com: https://github.com/NixOS/nixpkgs/pull/519082 github.com: https://github.com/NixOS/nixpkgs/pull/519093 github.com: https://github.com/pi-hole/FTL/releases/tag/v6.6.2