Information Exposure Affecting kernel-debug-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELDEBUGDEVEL-1945366
- published 26 Jul 2021
- disclosed 5 Aug 2015
Introduced: 5 Aug 2015
CVE-2015-2877 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel-debug-devel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-debug-devel
package and not the kernel-debug-devel
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities
References
- http://www.securityfocus.com/bid/76256
- http://www.kb.cert.org/vuls/id/935424
- https://access.redhat.com/security/cve/CVE-2015-2877
- https://bugzilla.redhat.com/show_bug.cgi?id=1252096
- https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
- https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
- https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
- http://www.antoniobarresi.com/files/cain_advisory.txt