Bug 2064512 (CVE-2021-25220)

Summary: CVE-2021-25220 bind: DNS forwarders - cache poisoning vulnerability
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anon.amish, dns-sig, jorton, kfujii, lilhuang, mosvald, mruprich, pavel, pemensik, security-response-team, suwu, vonsch, yanmliu, yozone, zdohnal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: bind 9.11.37, bind 9.16.27, bind 9.18.1 Doc Type: If docs needed, set a value
Doc Text:
A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote high privileged attacker to manipulate cache results with incorrect records, leading to queries made to the wrong servers, possibly resulting in false information received on the client's end.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-06 01:33:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2072538, 2072539, 2072540, 2072541, 2072543, 2072544, 2072545, 2072546, 2142466    
Bug Blocks: 2064517    

Description TEJ RATHI 2022-03-16 04:42:00 UTC
When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers.

Some examples of configurations that will be vulnerable are:

*Resolvers using per zone or global forwarding with forward first (forward first is the default).
*Resolvers not using global forwarding, but with per-zone forwarding with either forward first (the default) or forward                only.
*Resolvers configured with global forwarding along with zone statements that disable forwarding for part of the DNS namespace.

Authoritative-only BIND 9 servers are not vulnerable to this flaw.

Comment 3 TEJ RATHI 2022-04-06 13:45:38 UTC
Created bind tracking bugs for this issue:

Affects: fedora-34 [bug 2072538]
Affects: fedora-35 [bug 2072540]


Created dhcp tracking bugs for this issue:

Affects: fedora-34 [bug 2072539]
Affects: fedora-35 [bug 2072541]

Comment 8 errata-xmlrpc 2022-11-08 09:59:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7643 https://access.redhat.com/errata/RHSA-2022:7643

Comment 9 errata-xmlrpc 2022-11-08 10:29:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7790 https://access.redhat.com/errata/RHSA-2022:7790

Comment 10 errata-xmlrpc 2022-11-15 10:09:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8068 https://access.redhat.com/errata/RHSA-2022:8068

Comment 11 errata-xmlrpc 2022-11-15 11:05:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8385 https://access.redhat.com/errata/RHSA-2022:8385

Comment 12 Product Security DevOps Team 2022-12-06 01:33:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-25220

Comment 13 errata-xmlrpc 2023-01-24 10:10:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0402 https://access.redhat.com/errata/RHSA-2023:0402

Comment 15 errata-xmlrpc 2024-05-07 07:24:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:2720 https://access.redhat.com/errata/RHSA-2024:2720