CVE Vulnerabilities

CVE-2023-28450

Published: Mar 15, 2023 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

Affected Software

NameVendorStart VersionEnd Version
DnsmasqThekelleys*2.90 (excluding)
Red Hat Enterprise Linux 8RedHatdnsmasq-0:2.79-31.el8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatdnsmasq-0:2.79-21.el8_6.5*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatdnsmasq-0:2.79-26.el8_8.4*
Red Hat Enterprise Linux 9RedHatdnsmasq-0:2.85-14.el9*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatdnsmasq-0:2.85-6.el9_2.4*
DnsmasqUbuntubionic*
DnsmasqUbuntudevel*
DnsmasqUbuntuesm-infra-legacy/trusty*
DnsmasqUbuntuesm-infra/bionic*
DnsmasqUbuntuesm-infra/focal*
DnsmasqUbuntuesm-infra/xenial*
DnsmasqUbuntufocal*
DnsmasqUbuntujammy*
DnsmasqUbuntukinetic*
DnsmasqUbuntulunar*
DnsmasqUbuntumantic*
DnsmasqUbuntunoble*
DnsmasqUbuntutrusty*
DnsmasqUbuntutrusty/esm*
DnsmasqUbuntuupstream*
DnsmasqUbuntuxenial*

References