Public Date:
702657: CVE-2011-1780 kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits

The MITRE CVE dictionary describes this issue as:

The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.

Find out more about CVE-2011-1780 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5 via

Also, only systems running on x86 architecture with AMD processor and SVM virtualization extension enabled are affected.

CVSS v2 metrics

Base Score 6.1
Base Metrics AV:A/AC:L/Au:N/C:N/I:N/A:C
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:1163 2011-08-16
Red Hat Enterprise Linux EUS (v. 5.6 server) RHSA-2011:1163 2011-08-16
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:1065 2011-07-21
Last Modified

CVE description copyright © 2017, The MITRE Corporation