FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

rubygem-resolv -- Possible denial of service

Affected packages
rubygem-resolv < 0.6.2
3.2.0.p1,1 <= ruby < 3.2.9,1
3.3.0.p1,1 <= ruby < 3.3.9,1
3.4.0.p1,1 <= ruby < 3.4.5,1
3.5.0.p1,1 <= ruby < 3.5.0.p2,1
ruby32 < 3.2.9,1
ruby33 < 3.3.9,1
ruby34 < 3.4.5,1
ruby35 < 3.5.0.p2,1

Details

VuXML ID eed1a411-699b-11f0-91fe-000c295725e4
Discovery 2025-07-08
Entry 2025-07-25

Manu reports:

The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

References

CVE Name CVE-2025-24294
URL https://www.ruby-lang.org/en/news/2025/07/08/dos-resolv-cve-2025-24294/