| Summary | A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end. |
|---|---|
| Publication Date | May 12, 2026, 3:16 a.m. |
| Registration Date | May 12, 2026, 4:15 a.m. |
| Last Update | May 12, 2026, 3:16 a.m. |