Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libxenstore3.0": "4.4.0-0ubuntu5.1", "libxen-4.4": "4.4.0-0ubuntu5.1", "libxen-ocaml-dev": "4.4.0-0ubuntu5.1", "libxen-dev": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.3-amd64": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.3-armhf": "4.4.0-0ubuntu5.1", "xen-system-amd64": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.4-arm64": "4.4.0-0ubuntu5.1", "libxen-ocaml": "4.4.0-0ubuntu5.1", "xenstore-utils": "4.4.0-0ubuntu5.1", "xen-system-armhf": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.1-amd64": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.4-armhf": "4.4.0-0ubuntu5.1", "xen-hypervisor-4.4-amd64": "4.4.0-0ubuntu5.1", "xen-utils-common": "4.4.0-0ubuntu5.1", "xen-utils-4.4": "4.4.0-0ubuntu5.1", "xen-system-arm64": "4.4.0-0ubuntu5.1" } ] }