CVE-2013-1442

Publication date 30 September 2013

Last updated 24 July 2024


Ubuntu priority

Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
xen 13.10 saucy
Fixed 4.3.0-1ubuntu1.1
13.04 raring
Fixed 4.2.2-0ubuntu0.13.04.2
12.10 quantal
Fixed 4.1.5-0ubuntu0.12.10.2
12.04 LTS precise
Fixed 4.1.5-0ubuntu0.12.04.2
10.04 LTS lucid Not in release
xen-3.3 13.10 saucy Not in release
13.04 raring Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid
Not affected

Notes


seth-arnold

Problem can be mitigated with the “no-xsave” hypervisor command line option, which should be the default in 12.04 LTS and 12.10.


mdeslaur

This is XSA-62

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
xen