{
  "threat_severity" : "Moderate",
  "public_date" : "2013-09-24T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: xen: information leak on AVX and/or LWP capable CPUs",
    "id" : "1006431",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1006431"
  },
  "cvss" : {
    "cvss_base_score" : "2.3",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:S/C:P/I:N/A:N",
    "status" : "draft"
  },
  "details" : [ "Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers." ],
  "statement" : "Not vulnerable.\nThis issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.\nThis issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 as we did not have support for Xen hypervisor.",
  "acknowledgement" : "Red Hat would like to thank Xen project for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel-xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "realtime-kernel",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-1442\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-1442\nhttp://xenbits.xen.org/xsa/advisory-62.html" ],
  "name" : "CVE-2013-1442",
  "csaw" : false
}