The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
{
"binaries": [
{
"binary_name": "libxen-4.4",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "libxen-dev",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "libxen-ocaml",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "libxen-ocaml-dev",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "libxenstore3.0",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.1-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.3-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.3-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.4-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.4-arm64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-hypervisor-4.4-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-system-amd64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-system-arm64",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-system-armhf",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-utils-4.4",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xen-utils-common",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
},
{
"binary_name": "xenstore-utils",
"binary_version": "4.4.1-0ubuntu0.14.04.4"
}
],
"availability": "No subscription required"
}