First published: Wed Sep 16 2020(Updated: )
A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.21.1.rt56.1158.el7 | 0:3.10.0-1160.21.1.rt56.1158.el7 |
redhat/kernel | <0:3.10.0-1160.21.1.el7 | 0:3.10.0-1160.21.1.el7 |
redhat/Linux kernel | <5.9 | 5.9 |
Linux Kernel | <5.9.0 | |
Linux Kernel | =5.9.0 | |
Linux Kernel | =5.9.0-rc1 | |
Linux Kernel | =5.9.0-rc2 | |
Linux Kernel | =5.9.0-rc3 | |
Linux Kernel | =5.9.0-rc4 | |
Linux Kernel | =5.9.0-rc5 | |
Linux Kernel | =5.9.0-rc6 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
netapp solidfire \& hci management node | ||
netapp solidfire \& hci storage node | ||
openSUSE | =15.1 | |
openSUSE | =15.2 | |
All of | ||
NetApp HCI Compute Node BIOS | ||
netapp hci compute node | ||
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Debian | =9.0 | |
Debian | =10.0 | |
NetApp HCI Compute Node BIOS | ||
netapp hci compute node | ||
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
A possible workaround for this flaw is to configure IPsec for all traffic between the endpoints, instead of specifically for the UDP port used by the GENEVE tunnels. If GENEVE tunnels are not used, this flaw will not be triggered. In that case, it is possible to disable those tunnels, by unloading the "geneve" kernel module and blacklisting it (See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25645 has a high severity rating due to the potential for unencrypted traffic between Geneve endpoints.
To address CVE-2020-25645, you should upgrade to the Linux kernel version 5.9 or later.
CVE-2020-25645 affects Linux kernel versions prior to 5.9-rc7.
CVE-2020-25645 could allow attackers to intercept and read unencrypted traffic between Geneve tunnel endpoints.
No, IPsec configuration may not provide adequate protection for traffic on specific UDP ports used by the GENEVE tunnel as per CVE-2020-25645.