The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.2.3-1ubuntu0.24.04.6", "binary_name": "libruby3.2" }, { "binary_version": "3.2.3-1ubuntu0.24.04.6", "binary_name": "ruby3.2" }, { "binary_version": "3.2.3-1ubuntu0.24.04.6", "binary_name": "ruby3.2-dev" } ] }
{ "binaries": [ { "binary_version": "2.3.1-2~ubuntu16.04.16+esm10", "binary_name": "libruby2.3" }, { "binary_version": "2.3.1-2~ubuntu16.04.16+esm10", "binary_name": "ruby2.3" }, { "binary_version": "2.3.1-2~ubuntu16.04.16+esm10", "binary_name": "ruby2.3-dev" }, { "binary_version": "2.3.1-2~ubuntu16.04.16+esm10", "binary_name": "ruby2.3-tcltk" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.5.1-1ubuntu1.16+esm5", "binary_name": "libruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.16+esm5", "binary_name": "ruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.16+esm5", "binary_name": "ruby2.5-dev" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.7.0-5ubuntu1.18+esm1", "binary_name": "libruby2.7" }, { "binary_version": "2.7.0-5ubuntu1.18+esm1", "binary_name": "ruby2.7" }, { "binary_version": "2.7.0-5ubuntu1.18+esm1", "binary_name": "ruby2.7-dev" } ] }