Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
https://xenbits.xen.org/xsa/advisory-222.html
http://www.securityfocus.com/bid/99161
https://security.gentoo.org/glsa/201710-17
https://security.gentoo.org/glsa/201708-03
http://www.securitytracker.com/id/1038732
http://www.debian.org/security/2017/dsa-3969
Source: Mitre, NVD
Published: 2017-07-05
Updated: 2025-04-20
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS: 0.04059