Bug 1809833 (CVE-2020-1749)

Summary: CVE-2020-1749 kernel: some ipv6 protocols not encrypted over ipsec tunnel
Product: [Other] Security Response Reporter: Wade Mealing <wmealing>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, bhu, blc, brdeoliv, dhoward, dvlasenk, esammons, fhrbata, hkrzesin, iboverma, jlelli, jross, jshortt, jstancek, kernel-mgr, lgoncalv, matt, mcressma, mlangsdo, nmurray, qzhao, rt-maint, rvrbovsk, sdubroca, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Linux kernel version 5.5 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-28 16:35:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1774440, 1774447, 1809837, 1809838, 1809839, 1809840, 1809848, 1888655    
Bug Blocks: 1784146    

Description Wade Mealing 2020-03-04 01:31:16 UTC
A flaw was found in the Linux kernels implementation of some networking protocols in encrypted IPsec tunnels.

The most common use cases are VXLAN or GENEVE tunnels over IPv6.  When an encrypted tunnel is created between two hosts, the kernel will not correctly route this tunneled data over the encrypted link but instead will send the data unencrypted.

This could allow this information to be intercepted by a Man In the Middle (MITM) attack by an attacker with control over viewing contents between the two connection endpoints.

Fixed in:
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=6c8991f41546

Introduced in:
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=5f81bd2e5d80

Comment 1 Wade Mealing 2020-03-04 01:31:21 UTC
Acknowledgments:

Name: Xiumei Mu (Red Hat QE Engineering)

Comment 6 Wade Mealing 2020-03-04 02:01:23 UTC
Trackers above made, going to mark these trackers as duplicates of the product bugs. Leaving the -rt trackers.

Comment 15 Wade Mealing 2020-03-24 23:08:25 UTC
Mitigation:

Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.

Comment 16 errata-xmlrpc 2020-04-28 15:25:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1567 https://access.redhat.com/errata/RHSA-2020:1567

Comment 17 errata-xmlrpc 2020-04-28 15:52:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1769 https://access.redhat.com/errata/RHSA-2020:1769

Comment 18 Product Security DevOps Team 2020-04-28 16:35:25 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-1749

Comment 20 errata-xmlrpc 2020-09-29 18:59:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4062 https://access.redhat.com/errata/RHSA-2020:4062

Comment 21 errata-xmlrpc 2020-09-29 20:53:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:4060 https://access.redhat.com/errata/RHSA-2020:4060

Comment 38 errata-xmlrpc 2021-02-02 10:11:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:0354 https://access.redhat.com/errata/RHSA-2021:0354