DSA-2022-084: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities
Summary:Dell VxRail remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Makale alaka düzeyini kontrol etmek için lütfen bir ürün seçin
Bu makale şunlar için geçerlidir: Bu makale şunlar için geçerli değildir:Bu makale, belirli bir ürüne bağlı değildir.Bu makalede tüm ürün sürümleri tanımlanmamıştır.
Dell KB article: DSA-2022-027 See Intel workaround below
PowerEdge Server
CVE-2021-26312
See Dell KB article: DSA-2022-126 for more details
CVE-2021-26339
CVE-2021-26342
CVE-2021-26347
CVE-2021-26348
CVE-2021-26349
CVE-2021-26350
CVE-2021-26364
CVE-2021-26372
CVE-2021-26373
CVE-2021-26375
CVE-2021-26376
CVE-2021-26378
CVE-2021-26388
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
Etkilenen Ürünler ve Düzeltme
Product
Affected Versions
Updated Version
Dell VxRail Appliance
7.0.x versions before 7.0.370
7.0.370 (See NOTE in Workarounds and Mitigations section below.)
Product
Affected Versions
Updated Version
Dell VxRail Appliance
7.0.x versions before 7.0.370
7.0.370 (See NOTE in Workarounds and Mitigations section below.)
Geçici Çözümler ve Risk Azaltma
NOTE: STIG hardening version 2.0.001 resolves the VMware issue described in VMware article 88055, which blocked STIG hardening of VxRail 7.0.370 and later. Additionally, if STIG hardening version 2.0.000 or earlier was applied to a VxRail cluster version 7.0.360 or earlier, STIG hardening version 2.0.001 must be applied before upgrading to VxRail 7.0.370 and later.
Caution: If running a STIG hardened VxRail version 7.0.370 or later, follow the steps seen in “Known issues” in the VxRail STIG Hardening Guide. However, if you have already removed the VMware ESXi STIG VIB, you can disregard this caution.