CVE-2025-24294

CVE Details

Release Date:2025-07-12
Impact:Moderate What is this?

Description


The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

See more information about CVE-2025-24294 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 5.3
Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Version: 3.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Low

Errata information


PlatformErrataRelease Date
Oracle Linux version 10 (ruby) ELSA-2025-231412025-12-11
Oracle Linux version 8 (ruby) ELSA-2025-230622025-12-11
Oracle Linux version 8 (rubygem-abrt) ELSA-2025-230622025-12-11
Oracle Linux version 8 (rubygem-mysql2) ELSA-2025-230622025-12-11
Oracle Linux version 8 (rubygem-pg) ELSA-2025-230622025-12-11


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete