PT-2026-39702 · Dnsmasq · Dnsmasq
Published
2026-05-11
·
Updated
2026-05-11
·
CVE-2026-5172
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
A buffer overflow in dnsmasq’s extract addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract name() to advance the pointer past the record’s end.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Dnsmasq