Article Number: 000202365
Critical
Third-party Component | CVE | More information |
VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
CVE-2022-31673 | ||
CVE-2022-31674 | ||
CVE-2022-31675 | ||
VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31657 | ||
CVE-2022-31658 | ||
CVE-2022-31659 | ||
CVE-2022-31660 | ||
CVE-2022-31661 | ||
CVE-2022-31662 | ||
CVE-2022-31663 | ||
CVE-2022-31664 | ||
CVE-2022-31665 | ||
VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-28693 | ||
CVE-2022-23816 | ||
CVE-2022-23825 | ||
VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
CVE-2022-31655 | ||
VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
CVE-2022-21125 | ||
CVE-2022-21166 |
Third-party Component | CVE | More information |
VMware vRealize Operations | CVE-2022-31672 | VMSA-2022-0022 |
CVE-2022-31673 | ||
CVE-2022-31674 | ||
CVE-2022-31675 | ||
VMware vRealize Automation | CVE-2022-31656 | VMSA-2022-0021, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-31657 | ||
CVE-2022-31658 | ||
CVE-2022-31659 | ||
CVE-2022-31660 | ||
CVE-2022-31661 | ||
CVE-2022-31662 | ||
CVE-2022-31663 | ||
CVE-2022-31664 | ||
CVE-2022-31665 | ||
VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-29901 | VMSA-2022-0020, see KB articles for further details. The fix must be validated by VxRail and VxBlock engineering teams. |
CVE-2022-28693 | ||
CVE-2022-23816 | ||
CVE-2022-23825 | ||
VMware vRealize Log Insight 8.x | CVE-2022-31654 | VMSA-2022-0019, see KB articles for further details of fix, and file an EHC RPQ for the fixed 8.8.2 version. |
CVE-2022-31655 | ||
VMware Server (6.5, 6.7, and 7.0) | CVE-2022-22982 | VMSA-2022-0018, see KB articles for further details. For vCenter 7.0, the fix must be validated by VxRail and VxBlock engineering teams respectively once available. |
VMware ESXi (6.5, 6.7, and 7.0) | CVE-2022-21123 | VMSA-2022-0016, see KB articles for workarounds and fixes. |
CVE-2022-21125 | ||
CVE-2022-21166 |
Product | Affected Versions | Updated Versions |
Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
Product | Affected Versions | Updated Versions |
Dell Enterprise Hybrid Cloud | Versions before 4.1.2 | 4.1.2 |
Revision | Date | Description |
1.0 | 2022-08-10 | Initial Release |
Enterprise Hybrid Cloud, Enterprise Hybrid Cloud, Federation End User Computing Solution for Federation Enterprise Hybrid Cloud, Product Security Information
10 Aug 2022
1
Dell Security Advisory