CVE-2013-1442 in Xeninformación

Resumen (Inglés)

Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservar

2013-01-26

Divulgación

2013-09-30

Estado

Confirmado

Voces

VulDB provides additional information and datapoints for this CVE:

Fuentes

Might our Artificial Intelligence support you?

Check our Alexa App!