{
  "threat_severity" : "Important",
  "public_date" : "2011-07-07T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits",
    "id" : "702657",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=702657"
  },
  "cvss" : {
    "cvss_base_score" : "6.1",
    "cvss_scoring_vector" : "AV:A/AC:L/Au:N/C:N/I:N/A:C",
    "status" : "verified"
  },
  "details" : [ "The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread." ],
  "statement" : "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1065.html.\nAlso, only systems running on x86 architecture with AMD processor and SVM virtualization extension enabled are affected.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-07-21T00:00:00Z",
    "advisory" : "RHSA-2011:1065",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-274.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1163",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-238.21.1.el5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-1780\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-1780" ],
  "name" : "CVE-2011-1780",
  "csaw" : false
}