DSA-2022-022: Aktualizacja zabezpieczeń Dell EMC VxRail dla wielu luk w zabezpieczeniach elementów innego producenta
Summary: Rozwiązanie problemu z Dell EMC VxRail jest dostępne dla wielu luk w zabezpieczeniach, które mogą zostać wykorzystane przez złośliwych użytkowników w celu naruszenia integralności systemu, którego dotyczy luka. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Element innego producenta | CVE | Więcej informacji |
| VMware vCenter | CVE-2021-44832 | Apache Log4j VMSA-2021-0028 DSN-2021-007 DSA-2021-265 |
| CVE-2021-45105 | ||
| CVE-2021-44228 | ||
| CVE-2021-45046 | ||
| CVE-2021-22048 | VMSA-2021-0025 / luka w zabezpieczeniach umożliwiająca eskalację uprawnień | |
| CVE-2021-40438 | Apache HTTPD | |
| Kontroler VMware ESXi | CVE-2021-22045 | VMSA-2022-0001 / luka w zabezpieczeniach spowodowana przepełnieniem sterty |
| VxM SUSE Luki w zabezpieczeniach |
CVE-2016-10228 | |
| CVE-2018-13139 | ||
| CVE-2018-14679 | ||
| CVE-2018-14681 | ||
| CVE-2018-14682 | ||
| CVE-2018-19432 | ||
| CVE-2018-19758 | ||
| CVE-2019-20838 | ||
| CVE-2020-12049 | ||
| CVE-2020-12825 | ||
| CVE-2020-14155 | ||
| CVE-2020-23903 | ||
| CVE-2020-26137 | ||
| CVE-2020-29361 | ||
| CVE-2020-3702 | ||
| CVE-2020-8927 | ||
| CVE-2021-0941 | ||
| CVE-2021-20266 | ||
| CVE-2021-20271 | ||
| CVE-2021-20294 | ||
| CVE-2021-20322 | ||
| CVE-2021-21781 | ||
| CVE-2021-21996 | ||
| CVE-2021-22543 | ||
| CVE-2021-22946 | ||
| CVE-2021-22947 | ||
| CVE-2021-23214 | ||
| CVE-2021-2341 | ||
| CVE-2021-2369 | ||
| CVE-2021-2388 | ||
| CVE-2021-23222 | ||
| CVE-2021-30465 | ||
| CVE-2021-31810 | ||
| CVE-2021-31916 | ||
| CVE-2021-3246 | ||
| CVE-2021-32760 | ||
| CVE-2021-33574 | ||
| CVE-2021-33910 | ||
| CVE-2021-3421 | ||
| CVE-2021-3426 | ||
| CVE-2021-34556 | ||
| CVE-2021-34981 | ||
| CVE-2021-35477 | ||
| CVE-2021-35550 | ||
| CVE-2021-35556 | ||
| CVE-2021-35559 | ||
| CVE-2021-35561 | ||
| CVE-2021-35564 | ||
| CVE-2021-35565 | ||
| CVE-2021-35567 | ||
| CVE-2021-35578 | ||
| CVE-2021-35586 | ||
| CVE-2021-35603 | ||
| CVE-2021-3572 | ||
| CVE-2021-35942 | ||
| CVE-2021-36222 | ||
| CVE-2021-3640 | ||
| CVE-2021-3653 | ||
| CVE-2021-3656 | ||
| CVE-2021-3659 | ||
| CVE-2021-3669 | ||
| CVE-2021-3677 | ||
| CVE-2021-3679 | ||
| CVE-2021-3711 | ||
| CVE-2021-3712 | ||
| CVE-2021-37159 | ||
| CVE-2021-3732 | ||
| CVE-2021-3733 | ||
| CVE-2021-3737 | ||
| CVE-2021-3739 | ||
| CVE-2021-3743 | ||
| CVE-2021-3744 | ||
| CVE-2021-3752 | ||
| CVE-2021-3753 | ||
| CVE-2021-37576 | ||
| CVE-2021-3759 | ||
| CVE-2021-37600 | ||
| CVE-2021-3764 | ||
| CVE-2021-37750 | ||
| CVE-2021-38160 | ||
| CVE-2021-38198 | ||
| CVE-2021-38204 | ||
| CVE-2021-38205 | ||
| CVE-2021-38207 | ||
| CVE-2021-39537 | ||
| CVE-2021-40490 | ||
| CVE-2021-4104 | ||
| CVE-2021-41089 | ||
| CVE-2021-41091 | ||
| CVE-2021-41092 | ||
| CVE-2021-41103 | ||
| CVE-2021-41990 | ||
| CVE-2021-41991 | ||
| CVE-2021-43389 | ||
| CVE-2021-43527 | ||
| CVE-2021-43618 | ||
| CVE-2021-43784 |
Uwaga: ponieważ wersja niektórych pakietów systemu operacyjnego w vCenter Server 6.5 Update 3r i vCenter Server 6.7 Update 3p jest nowsza niż wersja w vCenter Server 7.0 Update 3c. Uaktualnienia z VxRail 4.5.470 i 4.7.540 do 7.0.320 mogą narazić system na następujące luki:
- Apache Tomcat: CVE-2021-41079 (7.5), CVE-2021-30639 (7.5), CVE-2021-30640 (6.5), CVE-2021-33037 (5.3)
- Eclipse Jetty: CVE-2021-34429 (5.0), CVE-2021-34428 (3.6), CVE-2021-28169 (5.0)
- cURL: CVE-2021-22897 (5.3), CVE-2021-22926 (7.5), CVE-2021-22925 (5.3), CVE-2021-22924 (3.7),
CVE-2021-22923 (5.3), CVE-2021-22922 (6.5) - OpenSSL library: CVE-2021-3712 (7.4)
- Oracle (Sun) JRE i JDK: CVE-2021-2388(5.1), CVE-2021-2163(2.6), CVE-2021-2161(4.3)
- SQLite: CVE-2021-20227(5.5)
| Element innego producenta | CVE | Więcej informacji |
| VMware vCenter | CVE-2021-44832 | Apache Log4j VMSA-2021-0028 DSN-2021-007 DSA-2021-265 |
| CVE-2021-45105 | ||
| CVE-2021-44228 | ||
| CVE-2021-45046 | ||
| CVE-2021-22048 | VMSA-2021-0025 / luka w zabezpieczeniach umożliwiająca eskalację uprawnień | |
| CVE-2021-40438 | Apache HTTPD | |
| Kontroler VMware ESXi | CVE-2021-22045 | VMSA-2022-0001 / luka w zabezpieczeniach spowodowana przepełnieniem sterty |
| VxM SUSE Luki w zabezpieczeniach |
CVE-2016-10228 | |
| CVE-2018-13139 | ||
| CVE-2018-14679 | ||
| CVE-2018-14681 | ||
| CVE-2018-14682 | ||
| CVE-2018-19432 | ||
| CVE-2018-19758 | ||
| CVE-2019-20838 | ||
| CVE-2020-12049 | ||
| CVE-2020-12825 | ||
| CVE-2020-14155 | ||
| CVE-2020-23903 | ||
| CVE-2020-26137 | ||
| CVE-2020-29361 | ||
| CVE-2020-3702 | ||
| CVE-2020-8927 | ||
| CVE-2021-0941 | ||
| CVE-2021-20266 | ||
| CVE-2021-20271 | ||
| CVE-2021-20294 | ||
| CVE-2021-20322 | ||
| CVE-2021-21781 | ||
| CVE-2021-21996 | ||
| CVE-2021-22543 | ||
| CVE-2021-22946 | ||
| CVE-2021-22947 | ||
| CVE-2021-23214 | ||
| CVE-2021-2341 | ||
| CVE-2021-2369 | ||
| CVE-2021-2388 | ||
| CVE-2021-23222 | ||
| CVE-2021-30465 | ||
| CVE-2021-31810 | ||
| CVE-2021-31916 | ||
| CVE-2021-3246 | ||
| CVE-2021-32760 | ||
| CVE-2021-33574 | ||
| CVE-2021-33910 | ||
| CVE-2021-3421 | ||
| CVE-2021-3426 | ||
| CVE-2021-34556 | ||
| CVE-2021-34981 | ||
| CVE-2021-35477 | ||
| CVE-2021-35550 | ||
| CVE-2021-35556 | ||
| CVE-2021-35559 | ||
| CVE-2021-35561 | ||
| CVE-2021-35564 | ||
| CVE-2021-35565 | ||
| CVE-2021-35567 | ||
| CVE-2021-35578 | ||
| CVE-2021-35586 | ||
| CVE-2021-35603 | ||
| CVE-2021-3572 | ||
| CVE-2021-35942 | ||
| CVE-2021-36222 | ||
| CVE-2021-3640 | ||
| CVE-2021-3653 | ||
| CVE-2021-3656 | ||
| CVE-2021-3659 | ||
| CVE-2021-3669 | ||
| CVE-2021-3677 | ||
| CVE-2021-3679 | ||
| CVE-2021-3711 | ||
| CVE-2021-3712 | ||
| CVE-2021-37159 | ||
| CVE-2021-3732 | ||
| CVE-2021-3733 | ||
| CVE-2021-3737 | ||
| CVE-2021-3739 | ||
| CVE-2021-3743 | ||
| CVE-2021-3744 | ||
| CVE-2021-3752 | ||
| CVE-2021-3753 | ||
| CVE-2021-37576 | ||
| CVE-2021-3759 | ||
| CVE-2021-37600 | ||
| CVE-2021-3764 | ||
| CVE-2021-37750 | ||
| CVE-2021-38160 | ||
| CVE-2021-38198 | ||
| CVE-2021-38204 | ||
| CVE-2021-38205 | ||
| CVE-2021-38207 | ||
| CVE-2021-39537 | ||
| CVE-2021-40490 | ||
| CVE-2021-4104 | ||
| CVE-2021-41089 | ||
| CVE-2021-41091 | ||
| CVE-2021-41092 | ||
| CVE-2021-41103 | ||
| CVE-2021-41990 | ||
| CVE-2021-41991 | ||
| CVE-2021-43389 | ||
| CVE-2021-43527 | ||
| CVE-2021-43618 | ||
| CVE-2021-43784 |
Uwaga: ponieważ wersja niektórych pakietów systemu operacyjnego w vCenter Server 6.5 Update 3r i vCenter Server 6.7 Update 3p jest nowsza niż wersja w vCenter Server 7.0 Update 3c. Uaktualnienia z VxRail 4.5.470 i 4.7.540 do 7.0.320 mogą narazić system na następujące luki:
- Apache Tomcat: CVE-2021-41079 (7.5), CVE-2021-30639 (7.5), CVE-2021-30640 (6.5), CVE-2021-33037 (5.3)
- Eclipse Jetty: CVE-2021-34429 (5.0), CVE-2021-34428 (3.6), CVE-2021-28169 (5.0)
- cURL: CVE-2021-22897 (5.3), CVE-2021-22926 (7.5), CVE-2021-22925 (5.3), CVE-2021-22924 (3.7),
CVE-2021-22923 (5.3), CVE-2021-22922 (6.5) - OpenSSL library: CVE-2021-3712 (7.4)
- Oracle (Sun) JRE i JDK: CVE-2021-2388(5.1), CVE-2021-2163(2.6), CVE-2021-2161(4.3)
- SQLite: CVE-2021-20227(5.5)
Affected Products & Remediation
| Produkt | Wersje, których dotyczy problem | Zaktualizowane wersje |
| Dell EMC VxRail Appliance | Wersje 7.0.x przed 7.0.320 | 7.0.320 |
| Produkt | Wersje, których dotyczy problem | Zaktualizowane wersje |
| Dell EMC VxRail Appliance | Wersje 7.0.x przed 7.0.320 | 7.0.320 |
Revision History
| Wersja | Data | Opis |
| 1.0 | 2022-02-01 | Pierwsze wydanie |
| 1.1 | 2022-02-28 | Dodano CVE SUSE |
Related Information
Legal Disclaimer
Affected Products
VxRail, CloudArray Virtual Edition for VxRail Appliance, Product Security Information, VMWare Cloud on Dell EMC VxRail E560F, VMWare Cloud on Dell EMC VxRail E560N, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series
, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560 VCF, VxRail E560F, VxRail E560F VCF, VxRail E560N, VxRail E560N VCF, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560 VCF, VxRail G560F, VxRail G560F VCF, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570 VCF, VxRail P570F, VxRail P570F VCF, VxRail P580N, VxRail P580N VCF, VxRail P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S570 VCF, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570 VCF, VxRail V570F, VxRail V570F VCF, VXRAIL V670F
...
Article Properties
Article Number: 000195888
Article Type: Dell Security Advisory
Last Modified: 19 Sept 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.