CVE-2025-24294
Published: July 17, 2025Last modified: July 17, 2025
Description
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Notes
Stream: resolv (default: 0.6.0) 23-LTS: resolv (default: 0.2.1)
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | ruby | Vulnerable (3.1.2-r1) |
Stream | ruby | Vulnerable (3.4.4-r0) |