Home 2.92rel2
affected
Description
A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.
Problem types
Product status
References
www.kb.cert.org/vuls/id/471747
lists.thekelleys.org.uk/...nsmasq-discuss/2026q2/018471.html
thekelleys.org.uk/dnsmasq/CVE/
github.com/NixOS/nixpkgs/pull/519082
github.com/NixOS/nixpkgs/pull/519093
github.com/pi-hole/FTL/releases/tag/v6.6.2