Date published: 2017-07-04T21:29:00.737-04:00
Date last modified: 2017-11-03T21:29:31.943-04:00
CVSS Score: 9.4
Principal attack vector: NETWORK
Reference URL: http://www.debian.org/security/2017/dsa-3969
Summary: Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.