The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libxen-4.4", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "libxen-dev", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "libxen-ocaml", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "libxen-ocaml-dev", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "libxenstore3.0", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.1-amd64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.3-amd64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.3-armhf", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.4-amd64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.4-arm64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-hypervisor-4.4-armhf", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-system-amd64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-system-arm64", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-system-armhf", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-utils-4.4", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xen-utils-common", "binary_version": "4.4.1-0ubuntu0.14.04.4" }, { "binary_name": "xenstore-utils", "binary_version": "4.4.1-0ubuntu0.14.04.4" } ] }