| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6264-1 | dnsmasq security update |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Wed, 13 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 11 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dnsmasq
Dnsmasq dnsmasq |
|
| Weaknesses | CWE-125 | |
| Vendors & Products |
Dnsmasq
Dnsmasq dnsmasq |
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end. | |
| Title | CVE-2026-5172 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-05-13T12:48:16.998Z
Reserved: 2026-03-30T15:54:52.205Z
Link: CVE-2026-5172
Updated: 2026-05-13T12:48:13.561Z
Status : Awaiting Analysis
Published: 2026-05-11T18:16:41.920
Modified: 2026-05-13T14:17:59.083
Link: CVE-2026-5172
OpenCVE Enrichment
Updated: 2026-05-13T16:30:36Z
Debian DSA