DSA-2019-183: Dell EMC Server Platform Security Advisory for Intel December 2019 Security Advisories-1

Riepilogo: Dell EMC Server Platform Security Advisory for Intel Platform Updates (December) to address multiple vulnerabilities which may be potentially exploited to compromise the system.

Questo articolo si applica a Questo articolo non si applica a Questo articolo non è legato a un prodotto specifico. Non tutte le versioni del prodotto sono identificate in questo articolo.

Impatto

High

Dettagli

Updates are available to address the following security vulnerabilities.


Intel-SA-00289: Voltage Settings Modification
  • CVE-2019-11157

Intel-SA-00317: Unexpected Page Fault in Virtualized Environment
  • CVE-2019-14607

Customers should also review their OS vendor’s Security Advisory for information, to ensure appropriate vulnerability identification and patch/configuration measures to be used in conjunction with the updates provided by Dell for the most effective mitigation.

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.

 
Dell EMC Server Products Affected
Product BIOS Update Version
(or greater)
Release Date/
Expected Release Date
(MM/DD/YYYY)
R640R740R740XDR940, NX3240, NX3340 2.4.8 12/2/19
XC740XDXC640XC940    
R540R440T440XR2 2.4.8 12/2/19
R740XD2 2.4.8 12/2/19
R840R940xa 2.4.7 11/12/19
T640 2.4.7 11/12/19
C6420XC6420 2.4.8 12/2/19
FC640M640M640P 2.4.8 12/2/19
MX740C 2.4.8 12/2/19
MX840C 2.4.8 12/2/19
C4140 2.4.8 12/2/19
T140***, T340***, R240***, R340***, NX440*** 2.2.3 Feb 2020
T40***   Feb 2020
DSS9600DSS9620DS9630    
 
T130***, R230***, T330***, R330***, NX430***   Feb 2020
T30***   Feb 2020
Updates are available to address the following security vulnerabilities.


Intel-SA-00289: Voltage Settings Modification
  • CVE-2019-11157

Intel-SA-00317: Unexpected Page Fault in Virtualized Environment
  • CVE-2019-14607

Customers should also review their OS vendor’s Security Advisory for information, to ensure appropriate vulnerability identification and patch/configuration measures to be used in conjunction with the updates provided by Dell for the most effective mitigation.

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.

 
Dell EMC Server Products Affected
Product BIOS Update Version
(or greater)
Release Date/
Expected Release Date
(MM/DD/YYYY)
R640R740R740XDR940, NX3240, NX3340 2.4.8 12/2/19
XC740XDXC640XC940    
R540R440T440XR2 2.4.8 12/2/19
R740XD2 2.4.8 12/2/19
R840R940xa 2.4.7 11/12/19
T640 2.4.7 11/12/19
C6420XC6420 2.4.8 12/2/19
FC640M640M640P 2.4.8 12/2/19
MX740C 2.4.8 12/2/19
MX840C 2.4.8 12/2/19
C4140 2.4.8 12/2/19
T140***, T340***, R240***, R340***, NX440*** 2.2.3 Feb 2020
T40***   Feb 2020
DSS9600DSS9620DS9630    
 
T130***, R230***, T330***, R330***, NX430***   Feb 2020
T30***   Feb 2020
Dell Technologies raccomanda a tutti i clienti di prendere in considerazione sia il punteggio base CVSS, sia ogni eventuale punteggio temporale o ambientale che possa avere effetti sul livello di gravità potenziale associato a una specifica vulnerabilità di sicurezza.

Prodotti interessati e correzione

Affected products:
 Dell EMC Servers (see Resolution section below for complete list of affected products)

Remediation:  
The following is a list of impacted products and expected release dates. Dell recommends all customers update at the earliest opportunity.

We encourage customers to review Intel’s Security Advisory for information, including appropriate identification and mitigation measures.

Please visit the Drivers and Downloads site for updates on the applicable products. Note, the following list of impacted products with released BIOS updates are linked. To learn more, visit the Dell Knowledge Base article Dell Updating Firmware using Dell Update Packages (DUP’s), and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS and firmware updates automatically once available.
 

SLN319712_en_US__1icon NOTE: All servers listed are impacted by CVE-2019-14607. The servers that are also impacted by CVE-2019-11157 are the servers with the three asterisks (***) listed.
Affected products:
 Dell EMC Servers (see Resolution section below for complete list of affected products)

Remediation:  
The following is a list of impacted products and expected release dates. Dell recommends all customers update at the earliest opportunity.

We encourage customers to review Intel’s Security Advisory for information, including appropriate identification and mitigation measures.

Please visit the Drivers and Downloads site for updates on the applicable products. Note, the following list of impacted products with released BIOS updates are linked. To learn more, visit the Dell Knowledge Base article Dell Updating Firmware using Dell Update Packages (DUP’s), and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS and firmware updates automatically once available.
 

SLN319712_en_US__1icon NOTE: All servers listed are impacted by CVE-2019-14607. The servers that are also impacted by CVE-2019-11157 are the servers with the three asterisks (***) listed.

Soluzioni alternative e mitigazioni

None

Informazioni correlate

Prodotti interessati

Datacenter Scalable Solutions, C Series, Modular Infrastructure, Rack Servers, Tower Servers
Proprietà dell'articolo
Numero articolo: 000180554
Tipo di articolo: Dell Security Advisory
Ultima modifica: 22 mag 2021
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.