Description
dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.
Problem types
CWE-190: Integer Overflow or Wraparound
Product status
References
www.suse.com/security/cve/CVE-2026-2291.html
www.kb.cert.org/vuls/id/471747
thekelleys.org.uk/dnsmasq/CVE/
lists.thekelleys.org.uk/...nsmasq-discuss/2026q2/018471.html
github.com/NixOS/nixpkgs/pull/519082
github.com/NixOS/nixpkgs/pull/519093
github.com/pi-hole/FTL/releases/tag/v6.6.2