CVE-2024-0564

A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

25 Nov 2024, 09:15

Type Values Removed Values Added
CWE CWE-99

21 Nov 2024, 08:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.3
References () https://access.redhat.com/security/cve/CVE-2024-0564 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2024-0564 - Third Party Advisory
References () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - Exploit, Issue Tracking () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - Exploit, Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - Issue Tracking
References () https://link.springer.com/conference/wisa - Not Applicable () https://link.springer.com/conference/wisa - Not Applicable
References () https://wisa.or.kr/accepted - Not Applicable () https://wisa.or.kr/accepted - Not Applicable

16 Oct 2024, 15:15

Type Values Removed Values Added
CWE CWE-99

08 Feb 2024, 16:36

Type Values Removed Values Added
CWE CWE-203
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - () https://bugzilla.redhat.com/show_bug.cgi?id=2258514 - Issue Tracking
References () https://link.springer.com/conference/wisa - () https://link.springer.com/conference/wisa - Not Applicable
References () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - () https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 - Exploit, Issue Tracking
References () https://wisa.or.kr/accepted - () https://wisa.or.kr/accepted - Not Applicable
References () https://access.redhat.com/security/cve/CVE-2024-0564 - () https://access.redhat.com/security/cve/CVE-2024-0564 - Third Party Advisory
First Time Redhat
Linux
Linux linux Kernel
Redhat enterprise Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

30 Jan 2024, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 15:15

Updated : 2024-11-25 09:15


NVD link : CVE-2024-0564

Mitre link : CVE-2024-0564

CVE.ORG link : CVE-2024-0564


JSON object : View

Products Affected

redhat

  • enterprise_linux

linux

  • linux_kernel
CWE
CWE-203

Observable Discrepancy