DSA-2022-173: DELL Secure Connect Gateway Security Update for Multiple Third-Party Component Vulnerabilities
Résumé: DELL Secure Connect Gateway contains remediation for multiple vulnerabilities that may be exploited by malicious users to compromise the affected system.
Cet article concerne
Cet article ne concerne pas
Cet article n’est associé à aucun produit spécifique.
Toutes les versions du produit ne sont pas identifiées dans cet article.
Impact
Critical
Détails
https://www.suse.com/security/cve/CVE-2022-1016.html
https://www.suse.com/security/cve/CVE-2019-10098.html
| Third-Party Component |
CVEs | More information | |
| Apache2 Apache2-prefork Apache2-utils Apache2-worker |
CVE-2017-3167 |
|
|
| CVE-2017-3169 |
|
||
| CVE-2017-7659 |
|
||
| CVE-2017-7679 |
|
||
| CVE-2017-9788 |
|
||
| CVE-2017-9789 |
|
||
| CVE-2017-9798 |
|
||
| CVE-2017-15710 |
|
||
| CVE-2017-15715 |
|
||
| CVE-2018-1283 |
|
||
| CVE-2018-1301 |
|
||
| CVE-2018-1302 |
|
||
| CVE-2018-1303 |
|
||
| CVE-2018-1312 |
|
||
| CVE-2018-1333 |
|
||
| CVE-2018-11763 |
|
||
| CVE-2018-17189 |
|
||
| CVE-2018-17199 |
|
||
| CVE-2019-0196 |
|
||
| CVE-2019-0197 |
|
||
| CVE-2019-0211 |
|
||
| CVE-2019-0217 |
|
||
| CVE-2019-0220 |
|
||
| CVE-2019-9517 |
|
||
| CVE-2019-10081 |
|
||
| CVE-2019-10082 |
|
||
| CVE-2019-10092 |
|
||
| CVE-2019-10098 |
|
||
| CVE-2020-1927 |
|
||
| CVE-2020-1934 |
|
||
| CVE-2020-1938 |
|
||
| CVE-2020-9490 |
|
||
| CVE-2020-11993 |
|
||
| CVE-2020-35452 |
|
||
| CVE-2021-26690 |
|
||
| CVE-2021-26691 |
|
||
| CVE-2021-30641 |
|
||
| CVE-2021-33193 |
|
||
| CVE-2021-34798 |
|
||
| CVE-2021-39275 |
|
||
| CVE-2021-40438 |
|
||
| CVE-2021-44224 |
|
||
| CVE-2021-44790 |
|
||
| CVE-2022-22719 |
|
||
| CVE-2022-22720 |
|
||
| CVE-2022-22721 |
|
||
| CVE-2022-23943 |
|
||
| Apache tomcat | CVE-2013-2185 | See NVD (http://nvd.nist.gov/ |
|
| CVE-2014-0230 | |||
| CVE-2016-5388 | |||
| CVE-2016-8745 | |||
| CVE-2017-5647 | |||
| CVE-2019-12423 | |||
| CVE-2019-17566 | |||
| CVE-2020-11987 | |||
| CVE-2020-11988 | |||
| CVE-2021-41079 | |||
| CVE-2022-27772 | |||
| ca-certificates libapparmor1 libp11-kit0 p11-kit p11-kit-tools |
CVE-2020-25721 |
|
|
| CVE-2020-29361 |
|
||
| CVE-2021-43566 |
|
||
| CVE-2021-44141 |
|
||
| CVE-2021-44142 |
|
||
| containerd docker runc |
CVE-2021-41089 |
|
|
| CVE-2021-41091 |
|
||
| CVE-2021-41092 |
|
||
| CVE-2021-41103 |
|
||
| CVE-2021-41190 |
|
||
| CVE-2022-23648 |
|
||
| curl libcurl |
CVE-2022-22576 |
|
|
| CVE-2022-27776 |
|
||
| CVE-2022-27781 |
|
||
| CVE-2022-27782 |
|
||
| expat libexpat1 |
CVE-2022-25235 |
|
|
| CVE-2022-25236 |
|
||
| CVE-2022-25313 |
|
||
| CVE-2022-25314 |
|
||
| CVE-2022-25315 |
|
||
| e2fsprogs | CVE-2022-1304 |
|
|
| glibc glibc-local |
CVE-2021-3999 |
|
|
| CVE-2022-23218 |
|
||
| CVE-2022-23219 |
|
||
| gzip | CVE-2022-1271 |
|
|
| java | CVE-2022-21248 |
|
|
| CVE-2022-21282 |
|
||
| CVE-2022-21283 |
|
||
| CVE-2022-21291 |
|
||
| CVE-2022-21293 |
|
||
| CVE-2022-21294 |
|
||
| CVE-2022-21296 |
|
||
| CVE-2022-21299 |
|
||
| CVE-2022-21305 |
|
||
| CVE-2022-21340 |
|
||
| CVE-2022-21341 |
|
||
| CVE-2022-21349 |
|
||
| CVE-2022-21360 |
|
||
| CVE-2022-21365 |
|
||
| jetty | CVE-2017-7658 |
|
|
| kernel-default-base |
CVE-2018-7755 |
|
|
| CVE-2019-20811 |
|
||
| CVE-2021-20292 |
|
||
| CVE-2021-20321 |
|
||
| CVE-2021-38208 |
|
||
| CVE-2021-39713 |
|
||
| CVE-2021-43389 |
|
||
| CVE-2021-44879 |
|
||
| CVE-2021-45868 |
|
||
| CVE-2022-0001 |
|
||
| CVE-2022-0002 |
|
||
| CVE-2022-0487 |
|
||
| CVE-2022-0492 |
|
||
| CVE-2022-0617 |
|
||
| CVE-2022-0644 |
|
||
| CVE-2022-0812 |
|
||
| CVE-2022-0847 |
|
||
| CVE-2022-0850 |
|
||
| CVE-2022-1011 |
|
||
| CVE-2022-1016 |
|
||
| CVE-2022-1048 |
|
||
| CVE-2022-1280 |
|
||
| CVE-2022-1353 |
|
||
| CVE-2022-1419 |
|
||
| CVE-2022-1516 |
|
||
| CVE-2022-23036 |
|
||
| CVE-2022-23037 |
|
||
| CVE-2022-23038 |
|
||
| CVE-2022-23039 |
|
||
| CVE-2022-23040 |
|
||
| CVE-2022-23041 |
|
||
| CVE-2022-23042 |
|
||
| CVE-2022-23960 |
|
||
| CVE-2022-24448 |
|
||
| CVE-2022-24959 |
|
||
| CVE-2022-26490 |
|
||
| CVE-2022-26966 |
|
||
| CVE-2022-27666 |
|
||
| CVE-2022-28356 |
|
||
| CVE-2022-28388 |
|
||
| CVE-2022-28389 |
|
||
| CVE-2022-28390 |
|
||
| CVE-2022-28748 |
|
||
| libglib-2_0-0 libgmodule-2_0-0 libgobject-2_0-0 |
CVE-2021-3800 |
|
|
| CVE-2021-28153 |
|
||
| OpenSSL | CVE-2022-0778 |
|
|
| libgmp10 | CVE-2021-43618 |
|
|
| CVE-2017-7186 |
|
||
| CVE-2017-7244 |
|
||
| CVE-2017-7245 |
|
||
| CVE-2017-7246 |
|
||
| CVE-2019-20838 |
|
||
| CVE-2020-14155 |
|
||
| libsasl | CVE-2022-24407 |
|
|
| libxml | CVE-2017-16932 |
|
|
| CVE-2022-29824 |
|
||
| CVE-2022-23308 |
|
||
| Log4j | CVE-2021-4104 |
|
|
| python libpython3_6m1_0 python36 python36-base |
CVE-2021-3572 |
|
|
| CVE-2021-3733 |
|
||
| CVE-2021-3737 |
|
||
| CVE-2021-4189 |
|
||
| CVE-2022-0391 |
|
||
| openldap | CVE-2022-29155 |
|
|
| ruby | CVE-2020-25613 |
|
|
| CVE-2021-31799 |
|
||
| CVE-2021-31810 |
|
||
| CVE-2021-32066 |
|
||
| zlib | CVE-2018-25032 |
|
|
| postgres | CVE-2022-1552 | https://www.postgresql.org/support/security/CVE-2022-1552/ |
Produits concernés et mesure corrective
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
Historique des révisions
| Revision | Date | Description |
| 1.0 | 2022-07-26 | Initial Release |
Informations connexes
Mention légale
Produits concernés
Secure Connect Gateway, Secure Connect Gateway - Virtual EditionProduits
Product Security InformationPropriétés de l’article
Numéro d’article: 000201854
Type d’article: Dell Security Advisory
Dernière modification: 19 sept. 2025
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.