Vulnerability Name: | CVE-2015-2877 (CCN-106177) | ||||||||||||||||||||||||
Assigned: | 2015-08-05 | ||||||||||||||||||||||||
Published: | 2015-08-05 | ||||||||||||||||||||||||
Updated: | 2020-06-04 | ||||||||||||||||||||||||
Summary: | ** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. Note: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities. | ||||||||||||||||||||||||
CVSS v3 Severity: | 3.3 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) 2.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-2877 Source: CCN Type: Full Disclosure Mailing List, Wed, 05 Aug 2015 23:47:46 +0200 Security Advisory - "Cross-VM ASL INtrospection (CAIN)" Source: MISC Type: Technical Description, Third Party Advisory http://www.antoniobarresi.com/files/cain_advisory.txt Source: CCN Type: US-CERT VU#935424 Virtual Machine Monitors (VMM) contain a memory deduplication vulnerability Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#935424 Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives Source: BID Type: Third Party Advisory, VDB Entry 76256 Source: CCN Type: BID-76256 Kernel Virtual Machine CVE-2015-2877 Memory Corruption Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1252096 (CVE-2015-2877) CVE-2015-2877 Kernel: Cross-VM ASL INtrospection (CAIN) Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1252096 Source: XF Type: UNKNOWN linux-kernel-cve20152877-info-disc(106177) Source: MISC Type: Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/BGAR-A2CNKG Source: MISC Type: Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH Source: MISC Type: Technical Description, Third Party Advisory https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |