Package: ruby3.3
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for ruby3.3.

CVE-2025-24294[0]:
| The attack vector is a potential Denial of Service (DoS). The
| vulnerability is caused by an insufficient check on the length of a
| decompressed domain name within a DNS packet.    An attacker can
| craft a malicious DNS packet containing a highly compressed domain
| name. When the resolv library parses such a packet, the name
| decompression process consumes a large amount of CPU resources, as
| the library does not limit the resulting length of the name.    This
| resource consumption can cause the application thread to become
| unresponsive, resulting in a Denial of Service condition.

https://www.ruby-lang.org/en/news/2025/07/08/dos-resolv-cve-2025-24294/
https://github.com/ruby/resolv/commit/24ed513f028d8e5c76310fcdecf07f79eb721a32 
(v0.3.1)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-24294
    https://www.cve.org/CVERecord?id=CVE-2025-24294

Please adjust the affected versions in the BTS as needed.

Reply via email to