Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

Article Number: 000192324


DSA-2021-213: Dell EMC Container Storage Modules Security Update for GoGo Protobuf Vulnerability

Summary: Dell EMC Container Storage Modules Security Update for GoGo Protobuf Vulnerability.

Article Content


Impact

High

Details

Third-party Component CVEs More information
GoGo Protobuf CVE-2021-3121 https://nvd.nist.gov/vuln/detail/CVE-2021-3121
Third-party Component CVEs More information
GoGo Protobuf CVE-2021-3121 https://nvd.nist.gov/vuln/detail/CVE-2021-3121
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

CVEs Addressed
 
Product Affected Versions Updated Versions Link to Update
CVE-2021-3121 Dell EMC Container Storage Modules CSM v1.0 CSM v1.0.1 Support for Container Storage Modules | Drivers & Downloads | Dell US 

Note: Kapp binary bundled with CSM image, not directly accessed by the users prevents invalid payloads from exploiting the vulnerability.

Dell Technologies recommends that customers apply the remediation, workarounds, or mitigations at the earliest opportunity. If you have any questions about this security advisory, contact Dell Support.
CVEs Addressed
 
Product Affected Versions Updated Versions Link to Update
CVE-2021-3121 Dell EMC Container Storage Modules CSM v1.0 CSM v1.0.1 Support for Container Storage Modules | Drivers & Downloads | Dell US 

Note: Kapp binary bundled with CSM image, not directly accessed by the users prevents invalid payloads from exploiting the vulnerability.

Dell Technologies recommends that customers apply the remediation, workarounds, or mitigations at the earliest opportunity. If you have any questions about this security advisory, contact Dell Support.

Revision History

RevisionDateDescription
1.02021-10-18Initial Release
1.12022-01-25removed the plural vulnerability referenence

Related Information


Article Properties


Affected Product

Product Security Information

Last Published Date

25 Jan 2022

Version

2

Article Type

Dell Security Advisory