summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2021-3714
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-03-01 20:31:26 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-03-01 20:31:26 +0100
commitc133c3e053efb056bd56839da37754ecb4df1e86 (patch)
tree2ac2ca9e602a5b9b95cbab183d881afcf671e159 /retired/CVE-2021-3714
parentbffd64fe3af77f4bbba909ee78ff73cc9b72f832 (diff)
Reitre CVE-2021-3714
Inherent problem, and issue can only be fixed by not using KSM.
Diffstat (limited to 'retired/CVE-2021-3714')
-rw-r--r--retired/CVE-2021-371418
1 files changed, 18 insertions, 0 deletions
diff --git a/retired/CVE-2021-3714 b/retired/CVE-2021-3714
new file mode 100644
index 00000000..a0f22039
--- /dev/null
+++ b/retired/CVE-2021-3714
@@ -0,0 +1,18 @@
+Description: Remote Page Deduplication Attacks
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1931327
+ https://arxiv.org/pdf/2111.08553.pdf
+Notes:
+ carnil> As per 2022-04-02 not yet much details on the Red Hat bugzila
+ carnil> entry. Asked for some details.
+ bwh> This really sounds like "KSM has timing side-channels", which is
+ bwh> an inherent problem and can only be fixed by not using it.
+Bugs:
+upstream: ignored "inherent problem and can only be fixed by not using KSM"
+5.10-upstream-stable: ignored "inherent problem and can only be fixed by not using KSM"
+4.19-upstream-stable: ignored "inherent problem and can only be fixed by not using KSM"
+4.9-upstream-stable: ignored "inherent problem and can only be fixed by not using KSM"
+sid: ignored "inherent problem and can only be fixed by not using KSM"
+5.10-bullseye-security: ignored "inherent problem and can only be fixed by not using KSM"
+4.19-buster-security: ignored "inherent problem and can only be fixed by not using KSM"
+4.9-stretch-security: ignored "inherent problem and can only be fixed by not using KSM"

© 2014-2024 Faster IT GmbH | imprint | privacy policy