Home

Description

dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.

PUBLISHED Reserved 2026-02-10 | Published 2026-05-11 | Updated 2026-05-11 | Assigner certcc

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

2.92rel2
affected

References

www.suse.com/security/cve/CVE-2026-2291.html

www.kb.cert.org/vuls/id/471747

thekelleys.org.uk/dnsmasq/CVE/

lists.thekelleys.org.uk/...nsmasq-discuss/2026q2/018471.html

github.com/NixOS/nixpkgs/pull/519082

github.com/NixOS/nixpkgs/pull/519093

github.com/pi-hole/FTL/releases/tag/v6.6.2

cve.org (CVE-2026-2291)

nvd.nist.gov (CVE-2026-2291)

Download JSON