Bug 1209358 (CVE-2023-28450) - VUL-0: CVE-2023-28450: dnsmasq: default maximum EDNS.0 UDP packet size should be 1232
Summary: VUL-0: CVE-2023-28450: dnsmasq: default maximum EDNS.0 UDP packet size should...
Status: RESOLVED FIXED
Alias: CVE-2023-28450
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/360223/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-28450:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-03-16 08:11 UTC by Alexander Bergmann
Modified: 2024-05-06 08:35 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-03-16 08:11:36 UTC
CVE-2023-28450

An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP
packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

Workaround:

Current versions can be used with the EDNS packet max flag:

--edns-packet-max=1232


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28450
https://www.cve.org/CVERecord?id=CVE-2023-28450
https://capec.mitre.org/data/definitions/495.html
https://thekelleys.org.uk/dnsmasq/doc.html
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
Comment 4 Maintenance Automation 2023-04-20 12:30:01 UTC
SUSE-SU-2023:1930-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1209358
CVE References: CVE-2023-28450
Sources used:
SUSE Linux Enterprise Real Time 15 SP3 (src): dnsmasq-2.86-150100.7.23.1
SUSE Linux Enterprise Micro 5.1 (src): dnsmasq-2.86-150100.7.23.1
SUSE Linux Enterprise Micro 5.2 (src): dnsmasq-2.86-150100.7.23.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): dnsmasq-2.86-150100.7.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 OBSbugzilla Bot 2023-04-25 10:35:11 UTC
This is an autogenerated message for OBS integration:
This bug (1209358) was mentioned in
https://build.opensuse.org/request/show/1082695 Factory / dnsmasq
Comment 7 Maintenance Automation 2023-05-08 12:30:04 UTC
SUSE-SU-2023:2123-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1209358
CVE References: CVE-2023-28450
Sources used:
HPE Helion OpenStack 8 (src): dnsmasq-2.78-18.21.1
SUSE OpenStack Cloud 8 (src): dnsmasq-2.78-18.21.1
SUSE OpenStack Cloud 9 (src): dnsmasq-2.78-18.21.1
SUSE OpenStack Cloud Crowbar 8 (src): dnsmasq-2.78-18.21.1
SUSE OpenStack Cloud Crowbar 9 (src): dnsmasq-2.78-18.21.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): dnsmasq-2.78-18.21.1
SUSE Linux Enterprise Server 12 SP5 (src): dnsmasq-2.78-18.21.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): dnsmasq-2.78-18.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Robert Frohl 2024-05-06 08:35:04 UTC
done, closing