CVE-2015-2877

** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities.
References
Link Resource
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf Technical Description Third Party Advisory
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG Third Party Advisory US Government Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1252096 Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/76256 Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/935424 Third Party Advisory US Government Resource
http://www.antoniobarresi.com/files/cain_advisory.txt Technical Description Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Information

Published : 2017-03-03 03:59

Updated : 2020-06-04 12:29


NVD link : CVE-2015-2877

Mitre link : CVE-2015-2877


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

redhat

  • enterprise_linux

linux

  • linux_kernel