Description
Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T05:32:20.252Z
Reserved: 2015-04-03T00:00:00.000Z
Link: CVE-2015-2877
No data.
Status : Modified
Published: 2017-03-03T11:59:00.147
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-2877
OpenCVE Enrichment
No data.
Weaknesses