{"id":"CVE-2025-24294","details":"The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.\r\n\r\nAn attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.\r\n\r\nThis resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.","aliases":["GHSA-xh69-987w-hrp8"],"modified":"2026-03-11T07:48:21.743871147Z","published":"2025-07-12T04:15:46Z","withdrawn":"2026-01-27T04:19:57.736051Z","related":["ALSA-2025:23062","ALSA-2025:23063","ALSA-2025:23141","CGA-6785-c33m-x6p8","SUSE-SU-2025:3776-1","SUSE-SU-2025:4264-1"],"references":[{"type":"WEB","url":"https://www.ruby-lang.org/en/news/2025/07/08/dos-resolv-cve-2025-24294/"}],"schema_version":"1.7.3"}