The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
{
"binaries": [
{
"binary_name": "libruby3.2",
"binary_version": "3.2.3-1ubuntu0.24.04.6"
},
{
"binary_name": "ruby3.2",
"binary_version": "3.2.3-1ubuntu0.24.04.6"
},
{
"binary_name": "ruby3.2-dev",
"binary_version": "3.2.3-1ubuntu0.24.04.6"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "libruby2.3",
"binary_version": "2.3.1-2~ubuntu16.04.16+esm11"
},
{
"binary_name": "ruby2.3",
"binary_version": "2.3.1-2~ubuntu16.04.16+esm11"
},
{
"binary_name": "ruby2.3-dev",
"binary_version": "2.3.1-2~ubuntu16.04.16+esm11"
},
{
"binary_name": "ruby2.3-tcltk",
"binary_version": "2.3.1-2~ubuntu16.04.16+esm11"
}
]
}{
"binaries": [
{
"binary_name": "libruby2.5",
"binary_version": "2.5.1-1ubuntu1.16+esm5"
},
{
"binary_name": "ruby2.5",
"binary_version": "2.5.1-1ubuntu1.16+esm5"
},
{
"binary_name": "ruby2.5-dev",
"binary_version": "2.5.1-1ubuntu1.16+esm5"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_name": "libruby2.7",
"binary_version": "2.7.0-5ubuntu1.18+esm1"
},
{
"binary_name": "ruby2.7",
"binary_version": "2.7.0-5ubuntu1.18+esm1"
},
{
"binary_name": "ruby2.7-dev",
"binary_version": "2.7.0-5ubuntu1.18+esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}