PT-2026-39702 · Dnsmasq · Dnsmasq

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-5172

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
A buffer overflow in dnsmasq’s extract addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract name() to advance the pointer past the record’s end.

Related Identifiers

CVE-2026-5172

Affected Products

Dnsmasq