Ubuntu Security Notice 5617-1 - It was discovered that memory
contents previously stored in microarchitectural special registers
after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel
client and Xeon E3 processors may be briefly exposed to processes
on the same or different processor cores. A local attacker could
use this to expose sensitive information. Julien Grall discovered
that Xen incorrectly handled memory barriers on ARM-based systems.
An attacker could possibly use this issue to cause a denial of
service, obtain sensitive information or escalate privileges.
Ubuntu Security Notice 5617-1 - It was discovered that memory
contents previously stored in microarchitectural special registers
after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel
client and Xeon E3 processors may be briefly exposed to processes
on the same or different processor cores. A local attacker could
use this to expose sensitive information. Julien Grall discovered
that Xen incorrectly handled memory barriers on ARM-based systems.
An attacker could possibly use this issue to cause a denial of
service, obtain sensitive information or escalate privileges.
Read more https://packetstormsecurity.com/files/168421/USN-5617-1.txt