🔐 CVE Alert

CVE-2026-5172

HIGH 7.3

CVE-2026-5172

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th

A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.

Vendor dnsmasq
Product dnsmasq
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for dnsmasq dnsmasq

Be the first to know when new high vulnerabilities affecting dnsmasq dnsmasq are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

dnsmasq / dnsmasq
2.92rel2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
kb.cert.org: https://www.kb.cert.org/vuls/id/471747 lists.thekelleys.org.uk: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html thekelleys.org.uk: https://thekelleys.org.uk/dnsmasq/CVE/ github.com: https://github.com/NixOS/nixpkgs/pull/519082 github.com: https://github.com/NixOS/nixpkgs/pull/519093 github.com: https://github.com/pi-hole/FTL/releases/tag/v6.6.2