Article Number: 000154653
Security KB
CVE-2019-11135
On November 12, 2019, Intel shared information about a new mechanism similar to Microarchitectural Data Sampling (MDS), referred to as Transactional Synchronization Extensions (TSX) Asynchronous Abort (TAA). This mechanism affects CPUs that support TSX and the mitigations include additional means to clear buffers in software or disable TSX for those customers who do not use this functionality.
Dell EMC is working closely with Intel to release security updates to address this vulnerability and help customers ensure the security of the data and systems.
Dell EMC urges customers to review this article for impact on Dell EMC Data Protection and Storage products.
For information on other Dell products, refer to:
Dell EMC is assessing impact across Storage and Data Protection. This article will be updated with the remediation status for any Dell EMC product that is impacted by these vulnerabilities.
Product | Supported Versions | Details |
Avamar | All | Impacted June 2020 |
Integrated Data Protection Appliance (IDPA) | 2.4, 2.3, 2.2, 2.1, and 2.0 | Impacted DSA-2020-078 |
Unity | All | Not Impacted |
Vblock | RCM 6.0.x, 6.5.x, and 6.7.x | Not Impacted |
VPLEX | All | Not Impacted |
VxBlock | RCM 6.0.x, 6.5.x, and 6.7.x | Not Impacted |
VxRail | ESXi 6.7 EP13/VC 6.7 U3a ESXi 6.5 EP17 /VC 6.5 U3d ESXi 6.0 EP22 |
Impacted: June 2020 |
VxRack Flex | RCM 3.3.1 - 3.3.5.4 RCM 3.4.0.0 - 3.4.0.4 RCM 3.5.0.0 - 3.5.0.4 |
Impacted: April 2020 |
VxRack SDDC | All | Impacted June 2020 |
The information should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories, Security Notices and Informational articles to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.
Product Security Information
Avamar, Integrated Data Protection Appliance Family, Product Security Information, Dell EMC Unity Family, VPLEX Series, VxRack SDDC, VxRail Appliance Family
21 Feb 2021
5
Security KB