First published: Wed Mar 15 2023(Updated: )
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | <2.90 | |
debian/dnsmasq | <=2.85-1<=2.89-1 | 2.90-4 |
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28450 is an issue discovered in Dnsmasq before version 2.90 where the default maximum EDNS.0 UDP packet size was set incorrectly.
The severity of CVE-2023-28450 is high with a CVSS score of 7.5.
Dnsmasq versions up to exclusive 2.90 are affected by CVE-2023-28450.
To fix CVE-2023-28450, upgrade to Dnsmasq version 2.90 or later.
You can find more information about CVE-2023-28450 at the MITRE website and the Fedora Project mailing list.