Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-2877
HistoryMar 03, 2017 - 12:00 a.m.

CVE-2015-2877

2017-03-0300:00:00
ubuntu.com
ubuntu.com
11

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

24.4%

DISPUTED Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32
through 4.x does not prevent use of a write-timing side channel, which
allows guest OS users to defeat the ASLR protection mechanism on other
guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE:
the vendor states “Basically if you care about this attack vector, disable
deduplication.” Share-until-written approaches for memory conservation
among mutually untrusting tenants are inherently detectable for information
disclosure, and can be classified as potentially misunderstood behaviors
rather than vulnerabilities.

Bugs

Notes

Author Note
tyhicks The behavior represented by CVE-2015-2877 is inherent to Kernel Samepage Merging. To mitigate the issue, follow the steps above to disable KSM.

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

24.4%

Related for UB:CVE-2015-2877