The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:23063 https://access.redhat.com/errata/RHSA-2025:23063
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:23062 https://access.redhat.com/errata/RHSA-2025:23062
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:23141 https://access.redhat.com/errata/RHSA-2025:23141
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2025:23648 https://access.redhat.com/errata/RHSA-2025:23648
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2025:23927 https://access.redhat.com/errata/RHSA-2025:23927