Bug 2379684 (CVE-2025-24294) - CVE-2025-24294 resolv: Denial of Service in resolv gem
Summary: CVE-2025-24294 resolv: Denial of Service in resolv gem
Keywords:
Status: NEW
Alias: CVE-2025-24294
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-12 04:01 UTC by OSIDB Bzimport
Modified: 2025-12-22 16:42 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:23062 0 None None None 2025-12-10 18:18:28 UTC
Red Hat Product Errata RHSA-2025:23063 0 None None None 2025-12-10 17:41:11 UTC
Red Hat Product Errata RHSA-2025:23141 0 None None None 2025-12-11 19:41:35 UTC
Red Hat Product Errata RHSA-2025:23648 0 None None None 2025-12-18 12:27:50 UTC
Red Hat Product Errata RHSA-2025:23927 0 None None None 2025-12-22 16:42:39 UTC

Description OSIDB Bzimport 2025-07-12 04:01:16 UTC
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

Comment 2 errata-xmlrpc 2025-12-10 17:41:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:23063 https://access.redhat.com/errata/RHSA-2025:23063

Comment 3 errata-xmlrpc 2025-12-10 18:18:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:23062 https://access.redhat.com/errata/RHSA-2025:23062

Comment 4 errata-xmlrpc 2025-12-11 19:41:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:23141 https://access.redhat.com/errata/RHSA-2025:23141

Comment 5 errata-xmlrpc 2025-12-18 12:27:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2025:23648 https://access.redhat.com/errata/RHSA-2025:23648

Comment 6 errata-xmlrpc 2025-12-22 16:42:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2025:23927 https://access.redhat.com/errata/RHSA-2025:23927


Note You need to log in before you can comment on or make changes to this bug.