Dell OptiPlex 5055 A-Series

Updating the system firmware improves performance.

Atom Feed

Version 1.12.0
2024-04-12 06:49:54

This release contains security updates as disclosed in the Dell Security Advisory.

Urgency medium
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.11.0
2024-02-07 00:31:43

"1.DCSV-2156: OpenSSL routing update for 2024

  • DCSV-1992: Vulnerabilities in EDK2 NetworkPkg IP stack implementation (VRT-15142)
  • DCSV-1780:Vulnerabilities in EDK2 Reference implementation of the UEFI Specification - CPG BIOS (VRT-13317)"

Urgency high
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.10.0
2023-09-13 09:11:27

This stable release fixes the following issues:

  • DCSV-1508: CPG BIOS: OpenSSL Vulnerabilities - Feb 2023 (VRT-12532)
  • DCSV-1597: Secure Boot Bypass Due To Lack Of UEFI Variable Protection
  • DCSV-1604: Data write Vulnerabilitity In dell precision workstation 7910(RuntimeAcpiSmm )

Urgency high
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.8.0
2022-11-11 10:47:06

This stable release fixes the following issues:

  • BITS478349 BR_No boot options show under BIOS->Boot Sequence when disable ""SATA-3"" port w/ RAID ON mode

Urgency high
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.7.0
2022-09-08 12:07:12

"Fixes and Enhancements - External:

  • DCSV-684: OpenSSL - C.VE-2022-0778 (PSRC-17704)
  • DCSV-753 - Dell BIOS vulnerability - XPS 13 7390(PSRC-18163)"

Urgency high
Fixed issues:
  • CVE-2022-0778

    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.6.2
2022-08-08 09:20:51

This stable release fixes the following issues:

Fixes and Enhancements -

External: Fix issue BITS479164

Urgency high
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.50
2022-04-15 02:28:23

This stable release makes the following change:

"Fixes and Enhancements - External:

  • Update DFU to 3.3.14"

Urgency critical
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.12
2021-05-04 15:04:05

Update BIOS flash method for known risk

Urgency high
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.10
2019-08-21 03:55:17

Regular BIOS release

Urgency medium
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.1.2
2017-12-15 10:05:16

Urgency None
Licenses
Security
Release Gating
Download Archive Firmware Details

LVFS © 2015 Richard Hughes with icons from Font Awesome and GeoIP data from IP2Location.

Linux Vendor Firmware Service Project a Series of LF Projects, LLC :: Charter