{"id":"CVE-2019-11135","details":"TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.","modified":"2026-04-16T04:37:28.229340543Z","published":"2019-11-14T19:15:13.113Z","related":["ALSA-2020:0279","SUSE-SU-2019:14217-1","SUSE-SU-2019:14218-1","SUSE-SU-2019:14220-1","SUSE-SU-2019:2946-1","SUSE-SU-2019:2947-1","SUSE-SU-2019:2948-1","SUSE-SU-2019:2949-1","SUSE-SU-2019:2950-1","SUSE-SU-2019:2951-1","SUSE-SU-2019:2952-1","SUSE-SU-2019:2953-1","SUSE-SU-2019:2954-1","SUSE-SU-2019:2955-1","SUSE-SU-2019:2956-1","SUSE-SU-2019:2957-1","SUSE-SU-2019:2958-1","SUSE-SU-2019:2959-1","SUSE-SU-2019:2960-1","SUSE-SU-2019:2961-1","SUSE-SU-2019:2962-1","SUSE-SU-2019:2984-1","SUSE-SU-2019:2986-1","SUSE-SU-2019:2987-1","SUSE-SU-2019:2988-1","SUSE-SU-2019:3091-1","SUSE-SU-2019:3200-1","SUSE-SU-2019:3294-1","SUSE-SU-2019:3295-1","SUSE-SU-2019:3297-1","SUSE-SU-2019:3340-1","SUSE-SU-2019:3348-1","SUSE-SU-2020:0093-1","SUSE-SU-2020:0334-1","SUSE-SU-2020:0388-1","SUSE-SU-2020:14444-1","SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","openSUSE-SU-2019:2503-1","openSUSE-SU-2019:2504-1","openSUSE-SU-2019:2505-1","openSUSE-SU-2019:2506-1","openSUSE-SU-2019:2507-1","openSUSE-SU-2019:2509-1","openSUSE-SU-2019:2510-1","openSUSE-SU-2019:2527-1","openSUSE-SU-2019:2528-1","openSUSE-SU-2019:2710-1","openSUSE-SU-2024:11008-1","openSUSE-SU-2024:11287-1","openSUSE-SU-2024:11396-1","openSUSE-SU-2024:11478-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/21"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4602"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/12/10/4"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/12/11/1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0026"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10306"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3936"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0730"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0555"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0279"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0366"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-56"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/12/10/3"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0028"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0666"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Dec/28"},{"type":"FIX","url":"https://seclists.org/bugtraq/2019/Nov/26"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"14.2"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.10"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.10"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"fixed":"2.20"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11135.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}