Ubuntu Security Notice 5617-1 - It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Julien Grall discovered that Xen incorrectly handled memory barriers on ARM-based systems. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information or escalate privileges.
650005c21b26b7970b9035b36b8dca3aa7d9fbba307cbcf7d4eded34c754cfb8
Debian Linux Security Advisory 4723-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, guest-to-host privilege escalation or information leaks.
23a14d5d4f1b40346c3b8f9436b94f8f84c91c2bcadf8328b731909eac010506
Gentoo Linux Security Advisory 202005-8 - Multiple vulnerabilities have been found in Xen, the worst of which could allow privilege escalation. Versions less than 4.12.2-r2 are affected.
8ba00f32c4e9e8000a32d7371e9e6a65e8aad643c362364438ff870a9a4f70d0