Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
https://xenbits.xen.org/xsa/advisory-221.html
https://security.gentoo.org/glsa/201708-03
http://www.securitytracker.com/id/1038731