CVE-2023-28450

NameCVE-2023-28450
DescriptionAn issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3974-1, ELA-1152-1, ELA-828-1
Debian Bugs1033165

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dnsmasq (PTS)jessie, jessie (lts)2.72-3+deb8u7fixed
stretch (security)2.76-5+deb9u3vulnerable
stretch (lts), stretch2.76-5+deb9u4fixed
buster, buster (lts)2.80-1+deb10u3fixed
buster (security)2.80-1+deb10u1vulnerable
bullseye2.85-1vulnerable
bullseye (security)2.85-1+deb11u1fixed
bookworm2.89-1vulnerable
sid, trixie2.90-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dnsmasqsourcejessie2.72-3+deb8u7ELA-828-1
dnsmasqsourcestretch2.76-5+deb9u4ELA-828-1
dnsmasqsourcebuster2.80-1+deb10u2ELA-1152-1
dnsmasqsourcebullseye2.85-1+deb11u1DLA-3974-1
dnsmasqsource(unstable)2.90-11033165

Notes

[bookworm] - dnsmasq <no-dsa> (Minor issue)
[buster] - dnsmasq <no-dsa> (Minor issue)
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5

Search for package or bug name: Reporting problems