CVE-2025-24294 PUBLISHED

Assigner: hackerone
Reserved: 17.01.2025 Published: 12.07.2025 Updated: 16.07.2025

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

Product Status

Vendor Ruby
Product resolv
Versions Default: unaffected
  • affected from 0.2 to 0.2.2 (incl.)
  • affected from 0.3.0 to 0.3.0 (incl.)
  • affected from 0.6 to 0.6.1 (incl.)

References