以下是从该网页截图中获取到的关键信息: Advertisement: - XSA-215 - Public Release: 2017-05-02 11:18 - Updated: 2017-05-12 10:44 - Version: 3 - CVES(s): CVE-2017-8905 - Title: Possible memory corruption via failsafe callback Files: - File name: advisory-215.txt - File: A signed notice file. - File name: xsa215.patch Advisory: - The Xen security notice updates version 3 of the Xen Security Advisory. - The issue description is about a possible memory corruption through a failsafe callback in certain special cases. - Impact: A malicious or buggy 64-bit PV guest can modify a part of the physical memory that does not belong to it, allowing for all privileges of the host, crashes, information leaks, etc. - Related systems: - The vulnerability is only exposed to 64-bit PV guests. - 32-bit PV guests and 64-bit ARM systems are not affected. - Mitigation: Running only HVM guests or 32-bit PV guests will circumvent the vulnerability. In addition, avoid the vulnerability by controlling the system's IP manually instead of via the administrator. - Resolution: The attached patch fixes the issue. Xen project security team.