跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

Speculative Store ByPass (CVE-2018-3639, CVE-2018-3640) impact on Dell products

摘要: Dell is investigating the side-channel vulnerabilities known as Speculative Store Bypass (CVE-2018-3639) and Rogue System Register Read (CVE-2018-3640) affecting many modern microprocessors used in Dell products. For more information, please refer to the resources and links. ...

本文可能採用自動翻譯。如果您對翻譯品質有任何寶貴意見,請使用此頁面底部的表單告訴我們,謝謝。

文章內容


症狀

Dell is investigating the side-channel vulnerabilities known as Speculative Store Bypass (CVE-2018-3639) and Rogue System Register Read (CVE-2018-3640) affecting many modern microprocessors used in Dell products. For more information, please review the security updates posted by Intel. We are working with Intel and others in the industry to address these issues.

Depending on the affected product, mitigations may include updates to firmware, system software and certain software components. Dell recommends adherence to industry standard security best practices including but not limited to timely software updates, avoiding unknown hyperlinks, websites and files or applications from unknown sources, using up-to-date anti-virus and other advanced threat protection solutions.

SLN318302_en_US__1icon Note: You can change the language on many of the web page(s), once you are on their site.

 

For more information on affected products and next steps, please refer to the following resources which will be updated regularly as new information becomes available. The following links will direct you to the support pages for specific Dell Technologies products:

References

While related to the Spectre-Meltdown vulnerabilities disclosed in January, a new set of microcode and operating system updates are required to mitigate these newly discovered vulnerabilities.

文章屬性


上次發佈日期

21 2月 2021

版本

5

文章類型

Solution