CVE-2013-2076

Published: 28 August 2013

Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerability to CVE-2006-1056. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.

Priority

Medium

Status

Package Release Status
xen
Launchpad, Ubuntu, Debian
Upstream Needed

Patches:
Upstream: http://lists.xen.org/archives/html/xen-announce/2013-06/binBidYFYTpbK.bin (4.1)
Upstream: http://lists.xen.org/archives/html/xen-announce/2013-06/binRis9tlvy4y.bin (4.2)
Binaries built from this source package are in Universe and so are supported by the community.
xen-3.3
Launchpad, Ubuntu, Debian
Upstream Ignored
(reached end-of-life)

Notes

AuthorNote
seth-arnold
Only vulnerable if on specific AMD AMD64 CPUs with xsave hypervisor
command line option
mdeslaur
This is XSA-52

References