2019-04-11 18:00:43 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2019-11135" ,
2019-11-14 19:01:42 +00:00
"ASSIGNER" : "secure@intel.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "2019.2 IPU \u2013 TSX Asynchronous Abort" ,
"version" : {
"version_data" : [
{
"version_value" : "See provided reference"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Information Disclosure"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html" ,
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
2019-11-15 04:00:58 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS" ,
"url" : "https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS"
2019-11-18 15:01:59 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)" ,
"url" : "https://seclists.org/bugtraq/2019/Nov/26"
2019-11-18 16:01:48 +00:00
} ,
{
"refsource" : "SUSE" ,
"name" : "openSUSE-SU-2019:2527" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"
} ,
{
"refsource" : "SUSE" ,
"name" : "openSUSE-SU-2019:2528" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"
2019-11-18 17:01:58 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" ,
"url" : "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
2019-11-19 04:01:48 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-376ec5c107" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
2019-11-19 15:01:53 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us" ,
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us"
2019-11-21 02:01:52 +00:00
} ,
{
"refsource" : "REDHAT" ,
"name" : "RHSA-2019:3936" ,
"url" : "https://access.redhat.com/errata/RHSA-2019:3936"
2019-11-25 15:02:14 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4186-2" ,
"url" : "https://usn.ubuntu.com/4186-2/"
2019-11-28 04:01:23 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-cbb732f760" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
2019-12-10 16:01:03 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)" ,
"url" : "http://www.openwall.com/lists/oss-security/2019/12/10/3"
2019-12-10 22:01:09 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20191210 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)" ,
"url" : "http://www.openwall.com/lists/oss-security/2019/12/10/4"
2019-12-11 10:01:00 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20191211 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)" ,
"url" : "http://www.openwall.com/lists/oss-security/2019/12/11/1"
2019-12-16 11:01:03 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update" ,
"url" : "https://seclists.org/bugtraq/2019/Dec/28"
2019-12-31 01:01:05 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"
2019-12-31 07:01:13 +00:00
} ,
{
"refsource" : "SUSE" ,
"name" : "openSUSE-SU-2019:2710" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
2020-01-06 18:01:06 +00:00
} ,
{
"refsource" : "REDHAT" ,
"name" : "RHSA-2020:0026" ,
"url" : "https://access.redhat.com/errata/RHSA-2020:0026"
} ,
{
"refsource" : "REDHAT" ,
"name" : "RHSA-2020:0028" ,
"url" : "https://access.redhat.com/errata/RHSA-2020:0028"
2020-01-14 04:01:03 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4602" ,
"url" : "https://www.debian.org/security/2020/dsa-4602"
2020-01-14 23:01:07 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20200114 [SECURITY] [DSA 4602-1] xen security update" ,
"url" : "https://seclists.org/bugtraq/2020/Jan/21"
2019-11-14 19:01:42 +00:00
}
]
2019-04-11 18:00:43 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-11-14 19:01:42 +00:00
"value" : "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access."
2019-04-11 18:00:43 +00:00
}
]
}
}