3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.4%
DISPUTED Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32
through 4.x does not prevent use of a write-timing side channel, which
allows guest OS users to defeat the ASLR protection mechanism on other
guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE:
the vendor states “Basically if you care about this attack vector, disable
deduplication.” Share-until-written approaches for memory conservation
among mutually untrusting tenants are inherently detectable for information
disclosure, and can be classified as potentially misunderstood behaviors
rather than vulnerabilities.
Author | Note |
---|---|
tyhicks | The behavior represented by CVE-2015-2877 is inherent to Kernel Samepage Merging. To mitigate the issue, follow the steps above to disable KSM. |
www.antoniobarresi.com/security/cloud/2015/07/30/cain/
bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-2877
launchpad.net/bugs/cve/CVE-2015-2877
nvd.nist.gov/vuln/detail/CVE-2015-2877
security-tracker.debian.org/tracker/CVE-2015-2877
www.cve.org/CVERecord?id=CVE-2015-2877
www.usenix.org/conference/woot15/workshop-program/presentation/barresi
3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
24.4%