Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-10917.json"
[ { "events": [ { "introduced": "0" }, { "last_affected": "4.8.1" } ] } ]