diff options
| author | Jan Beulich <jbeulich@suse.com> | 2013-09-25 10:54:30 +0200 |
|---|---|---|
| committer | Jan Beulich <jbeulich@suse.com> | 2013-09-25 10:54:30 +0200 |
| commit | 945b86cb98713cd6039de14597d1bd11bae58314 (patch) | |
| tree | ab8fb6a30a7bcf0aaa50e07f6219e3924ea23520 /tools/blktap2/drivers/hashtable_utility.c | |
| parent | d4d9332a1c3fbd3f1802ffb24a95429cfc1512ed (diff) | |
| download | xen-945b86cb98713cd6039de14597d1bd11bae58314.tar.gz xen-945b86cb98713cd6039de14597d1bd11bae58314.tar.bz2 xen-945b86cb98713cd6039de14597d1bd11bae58314.zip | |
x86/xsave: initialize extended register state when guests enable it
Till now, when setting previously unset bits in XCR0 we wouldn't touch
the active register state, thus leaving in the newly enabled registers
whatever a prior user of it left there, i.e. potentially leaking
information between guests.
This is CVE-2013-1442 / XSA-62.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 63a75ba0de817d6f384f96d25427a05c313e2179
master date: 2013-09-25 10:41:25 +0200
Diffstat (limited to 'tools/blktap2/drivers/hashtable_utility.c')
0 files changed, 0 insertions, 0 deletions
