Bug 2064512 (CVE-2021-25220)
Summary: | CVE-2021-25220 bind: DNS forwarders - cache poisoning vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | anon.amish, dns-sig, jorton, kfujii, lilhuang, mosvald, mruprich, pavel, pemensik, security-response-team, suwu, vonsch, yanmliu, yozone, zdohnal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bind 9.11.37, bind 9.16.27, bind 9.18.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote high privileged attacker to manipulate cache results with incorrect records, leading to queries made to the wrong servers, possibly resulting in false information received on the client's end.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-06 01:33:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2072538, 2072539, 2072540, 2072541, 2072543, 2072544, 2072545, 2072546, 2142466 | ||
Bug Blocks: | 2064517 |
Description
TEJ RATHI
2022-03-16 04:42:00 UTC
Created bind tracking bugs for this issue: Affects: fedora-34 [bug 2072538] Affects: fedora-35 [bug 2072540] Created dhcp tracking bugs for this issue: Affects: fedora-34 [bug 2072539] Affects: fedora-35 [bug 2072541] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7643 https://access.redhat.com/errata/RHSA-2022:7643 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7790 https://access.redhat.com/errata/RHSA-2022:7790 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8068 https://access.redhat.com/errata/RHSA-2022:8068 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8385 https://access.redhat.com/errata/RHSA-2022:8385 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-25220 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0402 https://access.redhat.com/errata/RHSA-2023:0402 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:2720 https://access.redhat.com/errata/RHSA-2024:2720 |