First published: Thu May 02 2019(Updated: )
Last updated 29 November 2024
Credit: Ke Sun Henrique Kawakami Kekai Hu Rodrigo Branco IntelYuval Yarom University of AdelaideBrandon Falk Microsoft Windows Platform Security TeamGiorgi Maisuradze Microsoft ResearchMichael Schwarz Daniel Gruss Graz University of TechnologyAlyssa Milburn Sebastian Osterlund Pietro Frigo Kaveh Razavi Herbert Bos Cristiano Giuffrida VUSec group at VU AmsterdamDan Horea Lutas BitDefenderMoritz Lipp secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Mojave | <10.14.5 | 10.14.5 |
macOS High Sierra | ||
macOS High Sierra | ||
All of | ||
Intel Microarchitectural Data Sampling Uncacheable Memory | ||
Intel Microarchitectural Data Sampling Uncacheable Memory firmware | ||
Red Hat Fedora | =29 | |
Intel Microarchitectural Data Sampling Uncacheable Memory | ||
Intel Microarchitectural Data Sampling Uncacheable Memory firmware | ||
debian/intel-microcode | 3.20240813.1~deb11u1 3.20250211.1~deb11u1 3.20250211.1~deb12u1 3.20231114.1~deb12u1 3.20250211.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.5+23-ga4e5191dc0-1+deb12u1 4.17.5+23-ga4e5191dc0-1 4.20.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-11091 has been assigned a medium severity level due to its potential for local information disclosure through side channels.
To mitigate CVE-2019-11091, users should apply the relevant security updates and patches provided by their operating system vendors.
CVE-2019-11091 affects multiple versions of Apple macOS, Fedora, and may involve Intel microarchitectural data sampling firmware.
Yes, CVE-2019-11091 is related to a hardware vulnerability that arises from the speculative execution features of some Intel microprocessors.
No, exploitation of CVE-2019-11091 requires that the attacker be an authenticated user with local access.