DSA-2022-173: DELL Secure Connect Gateway Security Update for Multiple Third-Party Component Vulnerabilities
Samenvatting: DELL Secure Connect Gateway contains remediation for multiple vulnerabilities that may be exploited by malicious users to compromise the affected system.
Dit artikel is van toepassing op
Dit artikel is niet van toepassing op
Dit artikel is niet gebonden aan een specifiek product.
Niet alle productversies worden in dit artikel vermeld.
Impact
Critical
Gegevens
https://www.suse.com/security/cve/CVE-2022-1016.html
https://www.suse.com/security/cve/CVE-2019-10098.html
| Third-Party Component |
CVEs | More information | |
| Apache2 Apache2-prefork Apache2-utils Apache2-worker |
CVE-2017-3167 |
|
|
| CVE-2017-3169 |
|
||
| CVE-2017-7659 |
|
||
| CVE-2017-7679 |
|
||
| CVE-2017-9788 |
|
||
| CVE-2017-9789 |
|
||
| CVE-2017-9798 |
|
||
| CVE-2017-15710 |
|
||
| CVE-2017-15715 |
|
||
| CVE-2018-1283 |
|
||
| CVE-2018-1301 |
|
||
| CVE-2018-1302 |
|
||
| CVE-2018-1303 |
|
||
| CVE-2018-1312 |
|
||
| CVE-2018-1333 |
|
||
| CVE-2018-11763 |
|
||
| CVE-2018-17189 |
|
||
| CVE-2018-17199 |
|
||
| CVE-2019-0196 |
|
||
| CVE-2019-0197 |
|
||
| CVE-2019-0211 |
|
||
| CVE-2019-0217 |
|
||
| CVE-2019-0220 |
|
||
| CVE-2019-9517 |
|
||
| CVE-2019-10081 |
|
||
| CVE-2019-10082 |
|
||
| CVE-2019-10092 |
|
||
| CVE-2019-10098 |
|
||
| CVE-2020-1927 |
|
||
| CVE-2020-1934 |
|
||
| CVE-2020-1938 |
|
||
| CVE-2020-9490 |
|
||
| CVE-2020-11993 |
|
||
| CVE-2020-35452 |
|
||
| CVE-2021-26690 |
|
||
| CVE-2021-26691 |
|
||
| CVE-2021-30641 |
|
||
| CVE-2021-33193 |
|
||
| CVE-2021-34798 |
|
||
| CVE-2021-39275 |
|
||
| CVE-2021-40438 |
|
||
| CVE-2021-44224 |
|
||
| CVE-2021-44790 |
|
||
| CVE-2022-22719 |
|
||
| CVE-2022-22720 |
|
||
| CVE-2022-22721 |
|
||
| CVE-2022-23943 |
|
||
| Apache tomcat | CVE-2013-2185 | See NVD (http://nvd.nist.gov/ |
|
| CVE-2014-0230 | |||
| CVE-2016-5388 | |||
| CVE-2016-8745 | |||
| CVE-2017-5647 | |||
| CVE-2019-12423 | |||
| CVE-2019-17566 | |||
| CVE-2020-11987 | |||
| CVE-2020-11988 | |||
| CVE-2021-41079 | |||
| CVE-2022-27772 | |||
| ca-certificates libapparmor1 libp11-kit0 p11-kit p11-kit-tools |
CVE-2020-25721 |
|
|
| CVE-2020-29361 |
|
||
| CVE-2021-43566 |
|
||
| CVE-2021-44141 |
|
||
| CVE-2021-44142 |
|
||
| containerd docker runc |
CVE-2021-41089 |
|
|
| CVE-2021-41091 |
|
||
| CVE-2021-41092 |
|
||
| CVE-2021-41103 |
|
||
| CVE-2021-41190 |
|
||
| CVE-2022-23648 |
|
||
| curl libcurl |
CVE-2022-22576 |
|
|
| CVE-2022-27776 |
|
||
| CVE-2022-27781 |
|
||
| CVE-2022-27782 |
|
||
| expat libexpat1 |
CVE-2022-25235 |
|
|
| CVE-2022-25236 |
|
||
| CVE-2022-25313 |
|
||
| CVE-2022-25314 |
|
||
| CVE-2022-25315 |
|
||
| e2fsprogs | CVE-2022-1304 |
|
|
| glibc glibc-local |
CVE-2021-3999 |
|
|
| CVE-2022-23218 |
|
||
| CVE-2022-23219 |
|
||
| gzip | CVE-2022-1271 |
|
|
| java | CVE-2022-21248 |
|
|
| CVE-2022-21282 |
|
||
| CVE-2022-21283 |
|
||
| CVE-2022-21291 |
|
||
| CVE-2022-21293 |
|
||
| CVE-2022-21294 |
|
||
| CVE-2022-21296 |
|
||
| CVE-2022-21299 |
|
||
| CVE-2022-21305 |
|
||
| CVE-2022-21340 |
|
||
| CVE-2022-21341 |
|
||
| CVE-2022-21349 |
|
||
| CVE-2022-21360 |
|
||
| CVE-2022-21365 |
|
||
| jetty | CVE-2017-7658 |
|
|
| kernel-default-base |
CVE-2018-7755 |
|
|
| CVE-2019-20811 |
|
||
| CVE-2021-20292 |
|
||
| CVE-2021-20321 |
|
||
| CVE-2021-38208 |
|
||
| CVE-2021-39713 |
|
||
| CVE-2021-43389 |
|
||
| CVE-2021-44879 |
|
||
| CVE-2021-45868 |
|
||
| CVE-2022-0001 |
|
||
| CVE-2022-0002 |
|
||
| CVE-2022-0487 |
|
||
| CVE-2022-0492 |
|
||
| CVE-2022-0617 |
|
||
| CVE-2022-0644 |
|
||
| CVE-2022-0812 |
|
||
| CVE-2022-0847 |
|
||
| CVE-2022-0850 |
|
||
| CVE-2022-1011 |
|
||
| CVE-2022-1016 |
|
||
| CVE-2022-1048 |
|
||
| CVE-2022-1280 |
|
||
| CVE-2022-1353 |
|
||
| CVE-2022-1419 |
|
||
| CVE-2022-1516 |
|
||
| CVE-2022-23036 |
|
||
| CVE-2022-23037 |
|
||
| CVE-2022-23038 |
|
||
| CVE-2022-23039 |
|
||
| CVE-2022-23040 |
|
||
| CVE-2022-23041 |
|
||
| CVE-2022-23042 |
|
||
| CVE-2022-23960 |
|
||
| CVE-2022-24448 |
|
||
| CVE-2022-24959 |
|
||
| CVE-2022-26490 |
|
||
| CVE-2022-26966 |
|
||
| CVE-2022-27666 |
|
||
| CVE-2022-28356 |
|
||
| CVE-2022-28388 |
|
||
| CVE-2022-28389 |
|
||
| CVE-2022-28390 |
|
||
| CVE-2022-28748 |
|
||
| libglib-2_0-0 libgmodule-2_0-0 libgobject-2_0-0 |
CVE-2021-3800 |
|
|
| CVE-2021-28153 |
|
||
| OpenSSL | CVE-2022-0778 |
|
|
| libgmp10 | CVE-2021-43618 |
|
|
| CVE-2017-7186 |
|
||
| CVE-2017-7244 |
|
||
| CVE-2017-7245 |
|
||
| CVE-2017-7246 |
|
||
| CVE-2019-20838 |
|
||
| CVE-2020-14155 |
|
||
| libsasl | CVE-2022-24407 |
|
|
| libxml | CVE-2017-16932 |
|
|
| CVE-2022-29824 |
|
||
| CVE-2022-23308 |
|
||
| Log4j | CVE-2021-4104 |
|
|
| python libpython3_6m1_0 python36 python36-base |
CVE-2021-3572 |
|
|
| CVE-2021-3733 |
|
||
| CVE-2021-3737 |
|
||
| CVE-2021-4189 |
|
||
| CVE-2022-0391 |
|
||
| openldap | CVE-2022-29155 |
|
|
| ruby | CVE-2020-25613 |
|
|
| CVE-2021-31799 |
|
||
| CVE-2021-31810 |
|
||
| CVE-2021-32066 |
|
||
| zlib | CVE-2018-25032 |
|
|
| postgres | CVE-2022-1552 | https://www.postgresql.org/support/security/CVE-2022-1552/ |
Getroffen producten en herstel
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
Revisiegeschiedenis
| Revision | Date | Description |
| 1.0 | 2022-07-26 | Initial Release |
Verwante informatie
Juridische verklaring van afstand
Getroffen producten
Secure Connect Gateway, Secure Connect Gateway - Virtual EditionProducten
Product Security InformationArtikeleigenschappen
Artikelnummer: 000201854
Artikeltype: Dell Security Advisory
Laatst aangepast: 19 sep. 2025
Vind antwoorden op uw vragen via andere Dell gebruikers
Support Services
Controleer of uw apparaat wordt gedekt door Support Services.