|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-0564: kernel: max page sharing of Kernel Samepage Merging (KSM) may cause memory deduplication | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Vlastimil Babka <vbabka> |
| Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | meissner, mhocko, mkoutny, rfrohl, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/391868/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2024-0564:6.5:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-01-22 09:42:30 UTC
KSM is disabled by default and requires root to enable it via /sys/kernel/mm/ksm/run interface. Also up until d7597f59d1d3 ("mm: add new api to enable ksm per process") merged 6.4 based kernels applications need to explicitly mark VMAs to be mergeable. After then application could be tricked into using KSM via prctl PR_GET_MEMORY_MERGE from parent process. Even in this case the KSM functionality needs to be enabled by the root.
There are no efforts to block KSM beyond that in upstream other than to disable CONFIG_KSM which is something that would break safe usecases as well.
Therefore I do not think we are affected in default configurations and we should close this CVE as INVALID.
|