Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. resolv
  4. ›
  5. CVE-2025-24294

CVE-2025-24294: resolv vulnerable to DoS via insufficient DNS domain name length validation

July 15, 2025

A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby.

References

  • github.com/advisories/GHSA-xh69-987w-hrp8
  • github.com/ruby/resolv
  • github.com/ruby/resolv/commit/4c2f71b5e80826506f78417d85b38481c058fb25
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/resolv/CVE-2025-24294.yml
  • nvd.nist.gov/vuln/detail/CVE-2025-24294
  • www.ruby-lang.org/en/news/2025/07/08/dos-resolv-cve-2025-24294

Code Behaviors & Features

Detect and mitigate CVE-2025-24294 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.2.3, all versions starting from 0.3.0 before 0.3.1, all versions starting from 0.4.0 before 0.6.2

Fixed versions

  • 0.2.3
  • 0.6.2
  • 0.3.1

Solution

Upgrade to versions 0.2.3, 0.3.1, 0.6.2 or above.

Weakness

  • CWE-1284: Improper Validation of Specified Quantity in Input

Source file

gem/resolv/CVE-2025-24294.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:05 +0000.