Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000154653


DSN-2019-002 TSX Asynchronous Abort (TAA) CVE-2019-11135: Impact on Dell EMC Data Protection and Storage Products

Summary: TSX Asynchronous Abort (TAA) CVE-2019-11135: Impact on Dell EMC Data Protection and Storage Products

Article Content


Security Article Type

Security KB

CVE Identifier

CVE-2019-11135

Issue Summary

On November 12, 2019, Intel shared information about a new mechanism similar to Microarchitectural Data Sampling (MDS), referred to as Transactional Synchronization Extensions (TSX) Asynchronous Abort (TAA). This mechanism affects CPUs that support TSX and the mitigations include additional means to clear buffers in software or disable TSX for those customers who do not use this functionality.

Dell EMC is working closely with Intel to release security updates to address this vulnerability and help customers ensure the security of the data and systems.

Dell EMC urges customers to review this article for impact on Dell EMC Data Protection and Storage products.

For information on other Dell products, refer to:  

Details

Dell EMC is assessing impact across Storage and Data Protection. This article will be updated with the remediation status for any Dell EMC product that is impacted by these vulnerabilities.
 

Product Supported Versions Details
Avamar All Impacted
June 2020
Integrated Data Protection Appliance (IDPA) 2.4, 2.3, 2.2, 2.1, and 2.0 Impacted
DSA-2020-078
Unity All Not Impacted
Vblock RCM 6.0.x, 6.5.x, and 6.7.x Not Impacted
VPLEX All Not Impacted
VxBlock RCM 6.0.x, 6.5.x, and 6.7.x Not Impacted
VxRail ESXi 6.7 EP13/VC 6.7 U3a

ESXi 6.5 EP17 /VC 6.5 U3d

ESXi 6.0 EP22
 
Impacted: 
June 2020
 
VxRack Flex RCM 3.3.1 - 3.3.5.4
RCM 3.4.0.0 - 3.4.0.4    
RCM 3.5.0.0 - 3.5.0.4
Impacted:
April 2020
VxRack SDDC All Impacted
June 2020

 

Recommendations

.

The information should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories, Security Notices and Informational articles to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.

Article Properties


Affected Product

Product Security Information

Product

Avamar, Integrated Data Protection Appliance Family, Product Security Information, Dell EMC Unity Family, VPLEX Series, VxRack SDDC, VxRail Appliance Family

Last Published Date

21 Feb 2021

Version

5

Article Type

Security KB