Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 905321 (CVE-2023-28450) - <net-dns/dnsmasq-2.90: excessive EDNS.0 UDP packet size limit
Summary: <net-dns/dnsmasq-2.90: excessive EDNS.0 UDP packet size limit
Status: CONFIRMED
Alias: CVE-2023-28450
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://thekelleys.org.uk/gitweb/?p=d...
Whiteboard: B4 [glsa cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-29 19:31 UTC by John Helmert III
Modified: 2024-10-12 08:17 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-29 19:31:18 UTC
CVE-2023-28450:

An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

"Set the default maximum DNS UDP packet size to 1232.

http://www.dnsflagday.net/2020/ refers.

Thanks to Xiang Li for the prompt."

Please bump to 2.90.