Public Date:
706323: CVE-2011-1936 kernel: xen: vmx: insecure cpuid vmexit

The MITRE CVE dictionary describes this issue as:

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

Find out more about CVE-2011-1936 from the MITRE CVE dictionary dictionary and NIST NVD.


The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via

Also, only systems running on x86 architecture with Intel processor and VMX
virtualization extension enabled are affected.

CVSS v2 metrics

Base Score 4.9
Base Metrics AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0927 2011-07-15
Last Modified

CVE description copyright © 2017, The MITRE Corporation