Bug 2379684 (CVE-2025-24294) - CVE-2025-24294 resolv: Denial of Service in resolv gem
Summary: CVE-2025-24294 resolv: Denial of Service in resolv gem
Keywords:
Status: NEW
Alias: CVE-2025-24294
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-12 04:01 UTC by OSIDB Bzimport
Modified: 2025-09-04 12:25 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-12 04:01:16 UTC
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.


Note You need to log in before you can comment on or make changes to this bug.