A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2024-0564 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 | Exploit Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=2258514 | Issue Tracking |
https://link.springer.com/conference/wisa | Not Applicable |
https://wisa.or.kr/accepted | Not Applicable |
https://access.redhat.com/security/cve/CVE-2024-0564 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 | Exploit Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=2258514 | Issue Tracking |
https://link.springer.com/conference/wisa | Not Applicable |
https://wisa.or.kr/accepted | Not Applicable |
Configurations
History
25 Nov 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://access.redhat.com/security/cve/CVE-2024-0564 - Third Party Advisory | |
References | () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - Exploit, Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - Issue Tracking | |
References | () https://link.springer.com/conference/wisa - Not Applicable | |
References | () https://wisa.or.kr/accepted - Not Applicable |
16 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-99 |
08 Feb 2024, 16:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - Issue Tracking | |
References | () https://link.springer.com/conference/wisa - Not Applicable | |
References | () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - Exploit, Issue Tracking | |
References | () https://wisa.or.kr/accepted - Not Applicable | |
References | () https://access.redhat.com/security/cve/CVE-2024-0564 - Third Party Advisory | |
First Time |
Redhat
Linux Linux linux Kernel Redhat enterprise Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
30 Jan 2024, 15:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-30 15:15
Updated : 2024-11-25 09:15
NVD link : CVE-2024-0564
Mitre link : CVE-2024-0564
CVE.ORG link : CVE-2024-0564
JSON object : View
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-203
Observable Discrepancy