Article Number: 000154653
Security KB
CVE-2019-11135
On November 12, 2019, Intel shared information about a new mechanism similar to Microarchitectural Data Sampling (MDS), seen as Transactional Synchronization Extensions (TSX) Asynchronous Abort (TAA). This mechanism affects CPUs that support TSX and the mitigations include additional means to clear buffers in software or disable TSX for those customers who do not use this functionality.
Dell is working closely with Intel to release security updates to address this vulnerability and help customers ensure the security of the data and systems.
Dell urges customers to review this article for its impact on Dell Data Protection and Storage products.
For information about other Dell products, see:
DSA-2019-147: Dell Client Platform Security Update for Intel Platform Updates (2019.2)
DSA-2019-166: Dell Server Platform Security Advisory for Intel Platform Updates (2019.2)
DSA-2019-153: Dell Networking Security Advisory for Intel Platform Updates (2019.2)
Dell is assessing the impact across Storage and Data Protection. This article is updated with the remediation status for any Dell product that these vulnerabilities impact.
Product | Supported Versions | Details |
Integrated Data Protection Appliance | 2.4, 2.3, 2.2, 2.1, and 2.0 | DSA-2020-078 |
Unity | All | Not Impacted |
Vblock | RCM 6.0.x, 6.5.x, and 6.7.x | Not Impacted |
VPLEX | All | Not Impacted |
VxBlock | RCM 6.0.x, 6.5.x, and 6.7.x | Not Impacted |
VxRail | ESXi 6.7 EP13/VC 6.7 U3a ESXi 6.5 EP17 /VC 6.5 U3d ESXi 6.0 EP22 |
DSA-2020-137 |
Product Security Information
Avamar, Integrated Data Protection Appliance Family, Product Security Information, Dell EMC Unity Family, VPLEX Series, VxRack SDDC, VxRail Appliance Family
10 Jan 2024
6
Security KB