{"id":"CVE-2019-11091","details":"Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf","modified":"2026-03-15T22:29:06.534628Z","published":"2019-05-30T16:29:01.417Z","related":["MGASA-2019-0171","MGASA-2019-0172","MGASA-2019-0173","MGASA-2019-0174","MGASA-2019-0179","SUSE-RU-2019:2715-1","SUSE-RU-2019:2767-1","SUSE-SU-2019:1235-1","SUSE-SU-2019:1236-1","SUSE-SU-2019:1238-1","SUSE-SU-2019:1239-1","SUSE-SU-2019:1240-1","SUSE-SU-2019:1241-1","SUSE-SU-2019:1242-1","SUSE-SU-2019:1243-1","SUSE-SU-2019:1244-1","SUSE-SU-2019:1245-1","SUSE-SU-2019:1248-1","SUSE-SU-2019:1268-1","SUSE-SU-2019:1269-1","SUSE-SU-2019:1272-1","SUSE-SU-2019:1287-1","SUSE-SU-2019:1289-1","SUSE-SU-2019:1296-1","SUSE-SU-2019:1313-1","SUSE-SU-2019:1347-1","SUSE-SU-2019:1348-1","SUSE-SU-2019:1349-1","SUSE-SU-2019:1356-1","SUSE-SU-2019:1371-1","SUSE-SU-2019:14048-1","SUSE-SU-2019:14051-1","SUSE-SU-2019:14052-1","SUSE-SU-2019:14053-1","SUSE-SU-2019:14063-1","SUSE-SU-2019:14133-1","SUSE-SU-2019:1423-1","SUSE-SU-2019:1438-1","SUSE-SU-2019:1452-1","SUSE-SU-2019:1490-1","SUSE-SU-2019:1547-1","SUSE-SU-2019:1550-1","SUSE-SU-2019:1909-1","SUSE-SU-2019:1910-1","SUSE-SU-2019:1954-1","SUSE-SU-2019:2430-1","SUSE-SU-2019:2753-1","SUSE-SU-2019:2769-1","SUSE-SU-2020:1255-1","SUSE-SU-2020:1275-1","openSUSE-SU-2019:1402-1","openSUSE-SU-2019:1403-1","openSUSE-SU-2019:1404-1","openSUSE-SU-2019:1405-1","openSUSE-SU-2019:1468-1","openSUSE-SU-2019:1505-1","openSUSE-SU-2019:1805-1","openSUSE-SU-2019:1806-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3977-3/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html"},{"type":"WEB","url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH73SGTJ575OBCPSJFX6LX7KP2KZIEN4/"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Jun/28"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Jun/36"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Nov/15"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10292"},{"type":"WEB","url":"https://seclists.org/bugtraq/2020/Jan/21"},{"type":"ADVISORY","url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en"},{"type":"ADVISORY","url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2553"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-56"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4602"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_19_24"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11091.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}