メイン コンテンツに進む
  • すばやく簡単にご注文が可能
  • 注文内容の表示、配送状況をトラック
  • 会員限定の特典や割引のご利用
  • 製品リストの作成とアクセスが可能
  • 「Company Administration(会社情報の管理)」では、お使いのDell EMCのサイトや製品、製品レベルでのコンタクト先に関する情報を管理できます。

文書番号: 000145501


Speculative Execution Side-Channel Vulnerabilities “L1 Terminal Fault” (CVE-2017-3615, CVE-2018-3620, CVE-2018-3646) impact on Dell products

概要: Dell is aware of a recently disclosed class of CPU speculative execution vulnerabilities (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646) known collectively as "L1 Terminal Fault" (L1TF). For more information, please refer to the resources and links. ...

文書の内容


現象

Dell is aware of a recently disclosed class of CPU speculative execution vulnerabilities (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646) known collectively as "L1 Terminal Fault" (L1TF) that affect Intel microprocessors. For more information on these vulnerabilities, please review the security advisory posted by Intel.

Dell is investigating the impact of these vulnerabilities on our products and we are working with Intel and other industry partners to mitigate these vulnerabilities.

For more information on affected products and next steps, please refer to the following resources which will be updated regularly as new information becomes available. The following links will direct you to the support pages for specific Dell Technologies products:

SLN318303_en_US__1icon Note: You can change the language on many of the web page(s), once you are on their respective site.

 

Dell recommends customers to follow security best practices for malware protection to help prevent possible exploitation of these vulnerabilities. These practices include, but are not limited to, promptly deploying software updates, avoiding unknown hyperlinks and websites, never downloading files or applications from unknown sources, and employing up-to-date anti-virus and advanced threat protection solutions.

文書のプロパティ


最後に公開された日付

21 2月 2021

バージョン

4

文書の種類

Solution