Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html - | |
References | () http://security.gentoo.org/glsa/glsa-201407-03.xml - | |
References | () http://www.debian.org/security/2014/dsa-3006 - | |
References | () http://www.openwall.com/lists/oss-security/2013/09/25/2 - | |
References | () http://www.securitytracker.com/id/1029090 - |
Information
Published : 2013-09-30 21:55
Updated : 2024-11-21 01:49
NVD link : CVE-2013-1442
Mitre link : CVE-2013-1442
CVE.ORG link : CVE-2013-1442
JSON object : View
Products Affected
xen
- xen
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor