Critical
Third-party Component | CVE(s) | More Information |
curl|7.60.0-11.46.1 libcurl4|7.60.0-11.46.1 |
CVE-2022-35252 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
git-core|2.26.2-27.57.1 | CVE-2022-29187 | |
gpg2|2.0.24-9.11.1 gpg2-lang|2.0.24-9.11.1 |
CVE-2022-34903 | |
java-1_8_0-openjdk|1.8.0.345-27.78.1 java-1_8_0-openjdk-headless|1.8.0.345-27.78.1 |
CVE-2022-34169 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 CVE-2022-21540 CVE-2022-21541 |
|
kernel-default|4.12.14-122.133.1 | CVE-2020-36516 CVE-2020-36557 CVE-2020-36558 CVE-2021-33655 CVE-2021-33656 CVE-2021-4203 CVE-2022-1462 CVE-2022-20166 CVE-2022-20368 CVE-2022-20369 CVE-2022-21385 CVE-2022-2588 CVE-2022-26373 CVE-2022-2639 CVE-2022-29154 CVE-2022-29581 CVE-2022-2977 CVE-2022-3028 CVE-2022-36879 CVE-2022-36946 |
|
libnl-config|3.2.23-4.7.1 libnl1|1.1.4-6.3.1 libnl3-200|3.2.23-4.7.1 |
CVE-2017-0386 | |
libjson-c2|0.12.1-4.3.1 | CVE-2020-12762 | |
libcroco-0_6-3|0.6.11-12.6.45 | CVE-2020-12825 | |
libicu52_1|52.1-8.13.1 libicu52_1-data|52.1-8.13.1 |
CVE-2020-21913 | |
libp11-kit0|0.23.2-8.10.1 p11-kit|0.23.2-8.10.1 p11-kit-tools|0.23.2-8.10.1 |
CVE-2020-29362 | |
libsqlite3-0|3.39.3-9.23.1 | CVE-2021-36690 CVE-2022-35737 |
|
libpcre2-8-0|10.34-1.10.1 | CVE-2022-1587 | |
libncurses5|5.9-78.1 libncurses6|5.9-78.1 ncurses-utils|5.9-78.1 terminfo|5.9-78.1 terminfo-base|5.9-78.1 |
CVE-2022-29458 | |
libvmtools0|12.1.0-4.45.1 open-vm-tools|12.1.0-4.45.1 |
CVE-2022-31676 | |
libz1|1.2.11-11.22.1 | CVE-2022-37434 | |
perl-HTTP-Daemon|6.01-9.5.1 | CVE-2022-31081 | |
permissions|20170707-6.10.1 | CVE-2022-31252 | |
ucode-intel|20220809-3.46.1 | CVE-2022-21233 | |
unzip|6.00-33.16.1 | CVE-2022-0529 CVE-2022-0530 |
Third-party Component | CVE(s) | More Information |
curl|7.60.0-11.46.1 libcurl4|7.60.0-11.46.1 |
CVE-2022-35252 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
git-core|2.26.2-27.57.1 | CVE-2022-29187 | |
gpg2|2.0.24-9.11.1 gpg2-lang|2.0.24-9.11.1 |
CVE-2022-34903 | |
java-1_8_0-openjdk|1.8.0.345-27.78.1 java-1_8_0-openjdk-headless|1.8.0.345-27.78.1 |
CVE-2022-34169 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 CVE-2022-21540 CVE-2022-21541 |
|
kernel-default|4.12.14-122.133.1 | CVE-2020-36516 CVE-2020-36557 CVE-2020-36558 CVE-2021-33655 CVE-2021-33656 CVE-2021-4203 CVE-2022-1462 CVE-2022-20166 CVE-2022-20368 CVE-2022-20369 CVE-2022-21385 CVE-2022-2588 CVE-2022-26373 CVE-2022-2639 CVE-2022-29154 CVE-2022-29581 CVE-2022-2977 CVE-2022-3028 CVE-2022-36879 CVE-2022-36946 |
|
libnl-config|3.2.23-4.7.1 libnl1|1.1.4-6.3.1 libnl3-200|3.2.23-4.7.1 |
CVE-2017-0386 | |
libjson-c2|0.12.1-4.3.1 | CVE-2020-12762 | |
libcroco-0_6-3|0.6.11-12.6.45 | CVE-2020-12825 | |
libicu52_1|52.1-8.13.1 libicu52_1-data|52.1-8.13.1 |
CVE-2020-21913 | |
libp11-kit0|0.23.2-8.10.1 p11-kit|0.23.2-8.10.1 p11-kit-tools|0.23.2-8.10.1 |
CVE-2020-29362 | |
libsqlite3-0|3.39.3-9.23.1 | CVE-2021-36690 CVE-2022-35737 |
|
libpcre2-8-0|10.34-1.10.1 | CVE-2022-1587 | |
libncurses5|5.9-78.1 libncurses6|5.9-78.1 ncurses-utils|5.9-78.1 terminfo|5.9-78.1 terminfo-base|5.9-78.1 |
CVE-2022-29458 | |
libvmtools0|12.1.0-4.45.1 open-vm-tools|12.1.0-4.45.1 |
CVE-2022-31676 | |
libz1|1.2.11-11.22.1 | CVE-2022-37434 | |
perl-HTTP-Daemon|6.01-9.5.1 | CVE-2022-31081 | |
permissions|20170707-6.10.1 | CVE-2022-31252 | |
ucode-intel|20220809-3.46.1 | CVE-2022-21233 | |
unzip|6.00-33.16.1 | CVE-2022-0529 CVE-2022-0530 |
Product | Affected Version(s) | Updated Version(s) | Link to Update |
Dell EMC Data Protection Central | 19.1 | 19.1 | To upgrade your Dell EMC Data Protection Central system, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions. See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs NOTE: the DPC version number is not updated by the DPC OS Update distribution that provides these fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.10-1 |
19.2 | 19.2 | ||
19.3 | 19.3 | ||
19.4 | 19.4 | ||
19.5 | 19.5 | ||
19.6 | 19.6 | ||
19.7 | 19.7 | ||
PowerProtect DP Series Appliance | 2.5 | 2.5 | To upgrade your PowerProtect DP Series Appliance Dell Data Protection Central component, see Dell article https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions. See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs NOTE: The DPC version number is not updated by the DPC OS Update distribution that provides these fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.10-1 |
Product | Affected Version(s) | Updated Version(s) | Link to Update |
Dell EMC Data Protection Central | 19.1 | 19.1 | To upgrade your Dell EMC Data Protection Central system, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions. See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs NOTE: the DPC version number is not updated by the DPC OS Update distribution that provides these fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.10-1 |
19.2 | 19.2 | ||
19.3 | 19.3 | ||
19.4 | 19.4 | ||
19.5 | 19.5 | ||
19.6 | 19.6 | ||
19.7 | 19.7 | ||
PowerProtect DP Series Appliance | 2.5 | 2.5 | To upgrade your PowerProtect DP Series Appliance Dell Data Protection Central component, see Dell article https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions. See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs NOTE: The DPC version number is not updated by the DPC OS Update distribution that provides these fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.10-1 |
Revision | Date | Description |
1.0 | 2022-10-28 | Initial Release |