First published: Wed Mar 04 2020(Updated: )
A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.rt56.1131.el7 | 0:3.10.0-1160.rt56.1131.el7 |
redhat/kernel | <0:3.10.0-1160.el7 | 0:3.10.0-1160.el7 |
redhat/kernel-alt | <0:4.14.0-115.35.1.el7a | 0:4.14.0-115.35.1.el7a |
redhat/kernel-rt | <0:4.18.0-193.rt13.51.el8 | 0:4.18.0-193.rt13.51.el8 |
redhat/kernel | <0:4.18.0-193.el8 | 0:4.18.0-193.el8 |
redhat/Linux kernel version | <5.5 | 5.5 |
Linux Kernel | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise MRG | =2.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-1749 is classified as a medium severity vulnerability.
To fix CVE-2020-1749, update your Linux kernel to the recommended versions provided by your distribution.
CVE-2020-1749 affects various versions of the Linux kernel, particularly in Red Hat Enterprise Linux 7 and 8.
CVE-2020-1749 involves improper handling of networking protocols in IPsec, leading to potential unencrypted data transmission.
Yes, CVE-2020-1749 could potentially be exploited remotely if an attacker has access to a vulnerable network.