CVE-2025-24294
ADVISORY - githubSummary
A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby.
Details
The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.
An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.
This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
Affected Version
The vulnerability affects the resolv gem bundled with the following Ruby series:
- Ruby 3.2 series: resolv version 0.2.2 and earlier
- Ruby 3.3 series: resolv version 0.3.0
- Ruby 3.4 series: resolv version 0.6.1 and earlier
Credits
Thanks to Manu for discovering this issue.
History
Originally published at 2025-07-08 07:00:00 (UTC)
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
NIST
3.9
CVSS SCORE
7.5highGitHub
CVSS SCORE
6.6mediumDebian
-
Ubuntu
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumChainguard
CGA-hf9h-x2f5-j377
-
Chainguard
CGA-pv27-mvwq-9997
-
Chainguard
CGA-whfv-67g6-jq92
-
Chainguard
CGA-wq6w-j5j2-h6hg
-
minimos
MINI-7fjj-vcc4-w34p
-
minimos
MINI-gjmm-fr84-ghr5
-
minimos
MINI-v8p2-jv76-37m8
-
minimos
MINI-vq79-cj57-p6w6
-
minimos
MINI-wg6f-c62c-j3q8
-
minimos
MINI-xfhr-h966-q9qg
-