DSA-2022-218: Dell Data Computing Appliance Security Update for Multiple Third-Party Component Vulnerabilities
Riepilogo: Dell Data Computing Appliance (DCA) contains remediation for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Questo articolo si applica a
Questo articolo non si applica a
Questo articolo non è legato a un prodotto specifico.
Non tutte le versioni del prodotto sono identificate in questo articolo.
Impatto
Critical
Dettagli
| Third-party Component | CVEs | More information |
kernel |
CVE-2021-4028 | See NVD (http://nvd.nist.gov/ |
| CVE-2021-4083 | ||
| CVE-2022-0492 | ||
| CVE-2020-0465 | ||
| CVE-2020-0466 | ||
| CVE-2021-0920 | ||
| CVE-2021-3564 | ||
| CVE-2021-3573 | ||
| CVE-2021-3752 | ||
| CVE-2021-4155 | ||
| CVE-2022-0330 | ||
| CVE-2022-22942 | ||
| libxml2 | CVE-2016-4658 | |
| libX11 | CVE-2021-31535 | |
| httpd | CVE-2021-40438 | |
| CVE-2022-22720 | ||
| CVE-2021-26691 | ||
| CVE-2021-34798 | ||
| CVE-2021-39275 | ||
| CVE-2021-44790 | ||
| nss | CVE-2021-43527 | |
| CVE-2020-25648 | ||
| sssd | CVE-2021-3621 | |
| xorg-x11-server | CVE-2021-3472 | |
| CVE-2021-4008 | ||
| CVE-2021-4009 | ||
| CVE-2021-4010 | ||
| CVE-2021-4011 | ||
| java-1.8.0-openjdk | CVE-2022-21248 | |
| CVE-2022-21282 | ||
| CVE-2022-21283 | ||
| CVE-2022-21293 | ||
| CVE-2022-21294 | ||
| CVE-2022-21296 | ||
| CVE-2022-21299 | ||
| CVE-2022-21305 | ||
| CVE-2022-21340 | ||
| CVE-2022-21341 | ||
| CVE-2022-21360 | ||
| CVE-2022-21365 | ||
| polkit | CVE-2021-4034 | |
| openssl | CVE-2021-3712 | |
| CVE-2022-0778 | ||
| rpm | CVE-2021-20271 | |
| openldap | CVE-2020-25692 | |
| CVE-2020-25709 | ||
| CVE-2020-25710 | ||
| Ansible | CVE-2021-3620 | |
| openssh | CVE-2021-41617 | |
| nettle | CVE-2021-20305 | |
| CVE-2021-20305 | ||
| binutils | CVE-2021-42574 | |
| bind | CVE-2021-25214 | |
| CVE-2021-25215 | ||
| microcode_ctl | CVE-2020-0543 | |
| CVE-2020-0548 | ||
| CVE-2020-0549 | ||
| CVE-2020-24489 | ||
| CVE-2020-24511 | ||
| CVE-2020-24512 | ||
| CVE-2020-8695 | ||
| CVE-2020-8696 | ||
| CVE-2020-8698 | ||
| CVE-2020-24489 | ||
| CVE-2020-24511 | ||
| CVE-2020-24512 | ||
| CVE-2020-24513 | ||
| Krb5 | CVE-2021-37750 | |
| glib2 | CVE-2021-27219 | |
| cyrus-sasl | CVE-2022-24407 | |
| gzip | CVE-2022-1271 | |
| zlib | CVE-2018-25032 | |
| rsyslog | CVE-2022-24903 | |
| postgresql | CVE-2019-10208 | |
| CVE-2020-25694 | ||
| CVE-2020-25695 | ||
| CVE-2021-32027 | ||
| CVE-2022-1552 | ||
| xz | CVE-2022-1271 | |
| expat | CVE-2021-45960 | |
| CVE-2021-46143 | ||
| CVE-2022-22822 | ||
| CVE-2022-22823 | ||
| CVE-2022-22824 | ||
| CVE-2022-22825 | ||
| CVE-2022-22826 | ||
| CVE-2022-22827 | ||
| CVE-2022-23852 | ||
| CVE-2022-25235 | ||
| CVE-2022-25236 | ||
| CVE-2022-25315 | ||
| INTEL-TA-00525 | CVE-2020-0592 | |
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8764 | ||
| CVE-2020-12357 | ||
| CVE-2020-12360 | ||
| CVE-2021-0092 | ||
| CVE-2021-0144 |
| Third-party Component | CVEs | More information |
kernel |
CVE-2021-4028 | See NVD (http://nvd.nist.gov/ |
| CVE-2021-4083 | ||
| CVE-2022-0492 | ||
| CVE-2020-0465 | ||
| CVE-2020-0466 | ||
| CVE-2021-0920 | ||
| CVE-2021-3564 | ||
| CVE-2021-3573 | ||
| CVE-2021-3752 | ||
| CVE-2021-4155 | ||
| CVE-2022-0330 | ||
| CVE-2022-22942 | ||
| libxml2 | CVE-2016-4658 | |
| libX11 | CVE-2021-31535 | |
| httpd | CVE-2021-40438 | |
| CVE-2022-22720 | ||
| CVE-2021-26691 | ||
| CVE-2021-34798 | ||
| CVE-2021-39275 | ||
| CVE-2021-44790 | ||
| nss | CVE-2021-43527 | |
| CVE-2020-25648 | ||
| sssd | CVE-2021-3621 | |
| xorg-x11-server | CVE-2021-3472 | |
| CVE-2021-4008 | ||
| CVE-2021-4009 | ||
| CVE-2021-4010 | ||
| CVE-2021-4011 | ||
| java-1.8.0-openjdk | CVE-2022-21248 | |
| CVE-2022-21282 | ||
| CVE-2022-21283 | ||
| CVE-2022-21293 | ||
| CVE-2022-21294 | ||
| CVE-2022-21296 | ||
| CVE-2022-21299 | ||
| CVE-2022-21305 | ||
| CVE-2022-21340 | ||
| CVE-2022-21341 | ||
| CVE-2022-21360 | ||
| CVE-2022-21365 | ||
| polkit | CVE-2021-4034 | |
| openssl | CVE-2021-3712 | |
| CVE-2022-0778 | ||
| rpm | CVE-2021-20271 | |
| openldap | CVE-2020-25692 | |
| CVE-2020-25709 | ||
| CVE-2020-25710 | ||
| Ansible | CVE-2021-3620 | |
| openssh | CVE-2021-41617 | |
| nettle | CVE-2021-20305 | |
| CVE-2021-20305 | ||
| binutils | CVE-2021-42574 | |
| bind | CVE-2021-25214 | |
| CVE-2021-25215 | ||
| microcode_ctl | CVE-2020-0543 | |
| CVE-2020-0548 | ||
| CVE-2020-0549 | ||
| CVE-2020-24489 | ||
| CVE-2020-24511 | ||
| CVE-2020-24512 | ||
| CVE-2020-8695 | ||
| CVE-2020-8696 | ||
| CVE-2020-8698 | ||
| CVE-2020-24489 | ||
| CVE-2020-24511 | ||
| CVE-2020-24512 | ||
| CVE-2020-24513 | ||
| Krb5 | CVE-2021-37750 | |
| glib2 | CVE-2021-27219 | |
| cyrus-sasl | CVE-2022-24407 | |
| gzip | CVE-2022-1271 | |
| zlib | CVE-2018-25032 | |
| rsyslog | CVE-2022-24903 | |
| postgresql | CVE-2019-10208 | |
| CVE-2020-25694 | ||
| CVE-2020-25695 | ||
| CVE-2021-32027 | ||
| CVE-2022-1552 | ||
| xz | CVE-2022-1271 | |
| expat | CVE-2021-45960 | |
| CVE-2021-46143 | ||
| CVE-2022-22822 | ||
| CVE-2022-22823 | ||
| CVE-2022-22824 | ||
| CVE-2022-22825 | ||
| CVE-2022-22826 | ||
| CVE-2022-22827 | ||
| CVE-2022-23852 | ||
| CVE-2022-25235 | ||
| CVE-2022-25236 | ||
| CVE-2022-25315 | ||
| INTEL-TA-00525 | CVE-2020-0592 | |
| CVE-2020-8738 | ||
| CVE-2020-8740 | ||
| CVE-2020-8764 | ||
| CVE-2020-12357 | ||
| CVE-2020-12360 | ||
| CVE-2021-0092 | ||
| CVE-2021-0144 |
Prodotti interessati e correzione
| Product | Affected Versions | Updated Versions | Link to Update |
| DCA | Versions before DCA 4.3.1.0 | DCA 4.3.1.0 | Download Greenplum-Data-Computing-Appliance-Software-Upgrade-to-4.3.1.0.bin package from https://dl.dell.com/downloads/ |
| DCA | Versions before Firmware tool 3I00 | DCA Firmware tool 3I00 | Registered customers can access the update after logging in to Dell Support at https://dl.dell.com/downloads/DLD2955_3I00-Firmware-Update-Utility-for-DCAv3.tgz. |
| Product | Affected Versions | Updated Versions | Link to Update |
| DCA | Versions before DCA 4.3.1.0 | DCA 4.3.1.0 | Download Greenplum-Data-Computing-Appliance-Software-Upgrade-to-4.3.1.0.bin package from https://dl.dell.com/downloads/ |
| DCA | Versions before Firmware tool 3I00 | DCA Firmware tool 3I00 | Registered customers can access the update after logging in to Dell Support at https://dl.dell.com/downloads/DLD2955_3I00-Firmware-Update-Utility-for-DCAv3.tgz. |
Soluzioni alternative e mitigazioni
Dell Software:
Only Dell Data Computing Appliance (DCA) version 4.0.0.0, 4.1.0.0, 4.2.0.0, and 4.2.1.0 can be upgraded to version 4.3.0.0 and then can be upgraded to 4.3.1.0.
To upgrade to an earlier DCA version, you must migrate to version 4.0.0.0 (THEL7), upgrade to version 4.3.0.0, and then upgrade to 4.3.1.0.
Cronologia delle revisioni
| Revision | Date | Description |
| 1.0 | 2022-08-02 | Initial release |
Informazioni correlate
Dichiarazione di non responsabilità
Prodotti interessati
Data Computing Appliance V3, Product Security InformationProprietà dell'articolo
Numero articolo: 000202087
Tipo di articolo: Dell Security Advisory
Ultima modifica: 19 set 2025
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.