CVE-2026-2291
Description
dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Heap buffer overflow in dnsmasq's extract_name() allows remote, unauthenticated attackers to inject false DNS cache entries, redirecting lookups or causing denial of service.
Vulnerability
The extract_name() function in dnsmasq fails to properly validate input, leading to a heap buffer overflow. This bug is rooted in an inadequate check on the size of domain names being processed, where the on-heap namebuffer is sized for the wire form (MAXDNAME) rather than the potentially larger escaped internal form (`MAXDNAME*2+1) [4]. An attacker can exploit this mismatch to write beyond the allocated buffer [1][2].
Exploitation
The vulnerability is network-accessible, requiring no authentication or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) [1]. A remote peer that can send or answer DNS queries can trigger the overflow; no special network position is needed. The flaw is present in essentially all non-ancient versions of dnsmasq, making it a widespread threat [3].
Impact
Successful exploitation enables an attacker to inject false DNS cache entries, redirecting subsequent DNS lookups to attacker-controlled IP addresses. This can lead to the interception of sensitive data, man-in-the-middle attacks, or further compromise. Additionally, the overflow can be used to cause a denial of service by crashing the dnsmasq crash) [1][2]. The issue is part of a heap out-of-bounds write, as confirmed by the Pi-hole advisory [4].
Mitigation
The dnsmasq project has released version 2.92rel2 to fix all six related CVEs, and patches are available from the official repository [3]. Vendors such as SUSE have published security advisories and updated packages [1]. Downstream projects like Pi-hole have incorporated the fix in release v6.6.2 [4]. Users should upgrade their dnsmasq instance immediately.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/NixOS/nixpkgs/pull/519082nvd
- github.com/NixOS/nixpkgs/pull/519093nvd
- github.com/pi-hole/FTL/releases/tag/v6.6.2nvd
- lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.htmlnvd
- thekelleys.org.uk/dnsmasq/CVE/nvd
- www.kb.cert.org/vuls/id/471747nvd
- www.suse.com/security/cve/CVE-2026-2291.htmlnvd
News mentions
1- ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and MoreThe Hacker News · May 18, 2026