CVE-2026-5172
CVE-2026-5172
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th
A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.
| Vendor | dnsmasq |
| Product | dnsmasq |
| Published | May 11, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for dnsmasq dnsmasq
Be the first to know when new high vulnerabilities affecting dnsmasq dnsmasq are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
dnsmasq / dnsmasq
2.92rel2
References
kb.cert.org: https://www.kb.cert.org/vuls/id/471747 lists.thekelleys.org.uk: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html thekelleys.org.uk: https://thekelleys.org.uk/dnsmasq/CVE/ github.com: https://github.com/NixOS/nixpkgs/pull/519082 github.com: https://github.com/NixOS/nixpkgs/pull/519093 github.com: https://github.com/pi-hole/FTL/releases/tag/v6.6.2