CVE-2015-2877

Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities
References
Link Resource
http://www.antoniobarresi.com/files/cain_advisory.txt Technical Description Third Party Advisory
http://www.kb.cert.org/vuls/id/935424 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/76256 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1252096 Issue Tracking Third Party Advisory
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH Third Party Advisory US Government Resource
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf Technical Description Third Party Advisory
http://www.antoniobarresi.com/files/cain_advisory.txt Technical Description Third Party Advisory
http://www.kb.cert.org/vuls/id/935424 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/76256 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1252096 Issue Tracking Third Party Advisory
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH Third Party Advisory US Government Resource
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://www.antoniobarresi.com/files/cain_advisory.txt - Technical Description, Third Party Advisory () http://www.antoniobarresi.com/files/cain_advisory.txt - Technical Description, Third Party Advisory
References () http://www.kb.cert.org/vuls/id/935424 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/935424 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/76256 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/76256 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1252096 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1252096 - Issue Tracking, Third Party Advisory
References () https://www.kb.cert.org/vuls/id/BGAR-A2CNKG - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/BGAR-A2CNKG - Third Party Advisory, US Government Resource
References () https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH - Third Party Advisory, US Government Resource
References () https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf - Technical Description, Third Party Advisory () https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf - Technical Description, Third Party Advisory

07 Nov 2023, 02:25

Type Values Removed Values Added
Summary ** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities. Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities

Information

Published : 2017-03-03 11:59

Updated : 2024-11-21 02:28


NVD link : CVE-2015-2877

Mitre link : CVE-2015-2877

CVE.ORG link : CVE-2015-2877


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor