DSA-2022-173: DELL Secure Connect Gateway Security Update for Multiple Third-Party Component Vulnerabilities
Summary: DELL Secure Connect Gateway contains remediation for multiple vulnerabilities that may be exploited by malicious users to compromise the affected system.
Ця стаття стосується
Ця стаття не стосується
Ця стаття не стосується якогось конкретного продукту.
У цій статті зазначено не всі версії продукту.
Impact
Critical
Details
https://www.suse.com/security/cve/CVE-2022-1016.html
https://www.suse.com/security/cve/CVE-2019-10098.html
| Third-Party Component |
CVEs | More information | |
| Apache2 Apache2-prefork Apache2-utils Apache2-worker |
CVE-2017-3167 |
|
|
| CVE-2017-3169 |
|
||
| CVE-2017-7659 |
|
||
| CVE-2017-7679 |
|
||
| CVE-2017-9788 |
|
||
| CVE-2017-9789 |
|
||
| CVE-2017-9798 |
|
||
| CVE-2017-15710 |
|
||
| CVE-2017-15715 |
|
||
| CVE-2018-1283 |
|
||
| CVE-2018-1301 |
|
||
| CVE-2018-1302 |
|
||
| CVE-2018-1303 |
|
||
| CVE-2018-1312 |
|
||
| CVE-2018-1333 |
|
||
| CVE-2018-11763 |
|
||
| CVE-2018-17189 |
|
||
| CVE-2018-17199 |
|
||
| CVE-2019-0196 |
|
||
| CVE-2019-0197 |
|
||
| CVE-2019-0211 |
|
||
| CVE-2019-0217 |
|
||
| CVE-2019-0220 |
|
||
| CVE-2019-9517 |
|
||
| CVE-2019-10081 |
|
||
| CVE-2019-10082 |
|
||
| CVE-2019-10092 |
|
||
| CVE-2019-10098 |
|
||
| CVE-2020-1927 |
|
||
| CVE-2020-1934 |
|
||
| CVE-2020-1938 |
|
||
| CVE-2020-9490 |
|
||
| CVE-2020-11993 |
|
||
| CVE-2020-35452 |
|
||
| CVE-2021-26690 |
|
||
| CVE-2021-26691 |
|
||
| CVE-2021-30641 |
|
||
| CVE-2021-33193 |
|
||
| CVE-2021-34798 |
|
||
| CVE-2021-39275 |
|
||
| CVE-2021-40438 |
|
||
| CVE-2021-44224 |
|
||
| CVE-2021-44790 |
|
||
| CVE-2022-22719 |
|
||
| CVE-2022-22720 |
|
||
| CVE-2022-22721 |
|
||
| CVE-2022-23943 |
|
||
| Apache tomcat | CVE-2013-2185 | See NVD (http://nvd.nist.gov/ |
|
| CVE-2014-0230 | |||
| CVE-2016-5388 | |||
| CVE-2016-8745 | |||
| CVE-2017-5647 | |||
| CVE-2019-12423 | |||
| CVE-2019-17566 | |||
| CVE-2020-11987 | |||
| CVE-2020-11988 | |||
| CVE-2021-41079 | |||
| CVE-2022-27772 | |||
| ca-certificates libapparmor1 libp11-kit0 p11-kit p11-kit-tools |
CVE-2020-25721 |
|
|
| CVE-2020-29361 |
|
||
| CVE-2021-43566 |
|
||
| CVE-2021-44141 |
|
||
| CVE-2021-44142 |
|
||
| containerd docker runc |
CVE-2021-41089 |
|
|
| CVE-2021-41091 |
|
||
| CVE-2021-41092 |
|
||
| CVE-2021-41103 |
|
||
| CVE-2021-41190 |
|
||
| CVE-2022-23648 |
|
||
| curl libcurl |
CVE-2022-22576 |
|
|
| CVE-2022-27776 |
|
||
| CVE-2022-27781 |
|
||
| CVE-2022-27782 |
|
||
| expat libexpat1 |
CVE-2022-25235 |
|
|
| CVE-2022-25236 |
|
||
| CVE-2022-25313 |
|
||
| CVE-2022-25314 |
|
||
| CVE-2022-25315 |
|
||
| e2fsprogs | CVE-2022-1304 |
|
|
| glibc glibc-local |
CVE-2021-3999 |
|
|
| CVE-2022-23218 |
|
||
| CVE-2022-23219 |
|
||
| gzip | CVE-2022-1271 |
|
|
| java | CVE-2022-21248 |
|
|
| CVE-2022-21282 |
|
||
| CVE-2022-21283 |
|
||
| CVE-2022-21291 |
|
||
| CVE-2022-21293 |
|
||
| CVE-2022-21294 |
|
||
| CVE-2022-21296 |
|
||
| CVE-2022-21299 |
|
||
| CVE-2022-21305 |
|
||
| CVE-2022-21340 |
|
||
| CVE-2022-21341 |
|
||
| CVE-2022-21349 |
|
||
| CVE-2022-21360 |
|
||
| CVE-2022-21365 |
|
||
| jetty | CVE-2017-7658 |
|
|
| kernel-default-base |
CVE-2018-7755 |
|
|
| CVE-2019-20811 |
|
||
| CVE-2021-20292 |
|
||
| CVE-2021-20321 |
|
||
| CVE-2021-38208 |
|
||
| CVE-2021-39713 |
|
||
| CVE-2021-43389 |
|
||
| CVE-2021-44879 |
|
||
| CVE-2021-45868 |
|
||
| CVE-2022-0001 |
|
||
| CVE-2022-0002 |
|
||
| CVE-2022-0487 |
|
||
| CVE-2022-0492 |
|
||
| CVE-2022-0617 |
|
||
| CVE-2022-0644 |
|
||
| CVE-2022-0812 |
|
||
| CVE-2022-0847 |
|
||
| CVE-2022-0850 |
|
||
| CVE-2022-1011 |
|
||
| CVE-2022-1016 |
|
||
| CVE-2022-1048 |
|
||
| CVE-2022-1280 |
|
||
| CVE-2022-1353 |
|
||
| CVE-2022-1419 |
|
||
| CVE-2022-1516 |
|
||
| CVE-2022-23036 |
|
||
| CVE-2022-23037 |
|
||
| CVE-2022-23038 |
|
||
| CVE-2022-23039 |
|
||
| CVE-2022-23040 |
|
||
| CVE-2022-23041 |
|
||
| CVE-2022-23042 |
|
||
| CVE-2022-23960 |
|
||
| CVE-2022-24448 |
|
||
| CVE-2022-24959 |
|
||
| CVE-2022-26490 |
|
||
| CVE-2022-26966 |
|
||
| CVE-2022-27666 |
|
||
| CVE-2022-28356 |
|
||
| CVE-2022-28388 |
|
||
| CVE-2022-28389 |
|
||
| CVE-2022-28390 |
|
||
| CVE-2022-28748 |
|
||
| libglib-2_0-0 libgmodule-2_0-0 libgobject-2_0-0 |
CVE-2021-3800 |
|
|
| CVE-2021-28153 |
|
||
| OpenSSL | CVE-2022-0778 |
|
|
| libgmp10 | CVE-2021-43618 |
|
|
| CVE-2017-7186 |
|
||
| CVE-2017-7244 |
|
||
| CVE-2017-7245 |
|
||
| CVE-2017-7246 |
|
||
| CVE-2019-20838 |
|
||
| CVE-2020-14155 |
|
||
| libsasl | CVE-2022-24407 |
|
|
| libxml | CVE-2017-16932 |
|
|
| CVE-2022-29824 |
|
||
| CVE-2022-23308 |
|
||
| Log4j | CVE-2021-4104 |
|
|
| python libpython3_6m1_0 python36 python36-base |
CVE-2021-3572 |
|
|
| CVE-2021-3733 |
|
||
| CVE-2021-3737 |
|
||
| CVE-2021-4189 |
|
||
| CVE-2022-0391 |
|
||
| openldap | CVE-2022-29155 |
|
|
| ruby | CVE-2020-25613 |
|
|
| CVE-2021-31799 |
|
||
| CVE-2021-31810 |
|
||
| CVE-2021-32066 |
|
||
| zlib | CVE-2018-25032 |
|
|
| postgres | CVE-2022-1552 | https://www.postgresql.org/support/security/CVE-2022-1552/ |
Продукти й засоби виправлення, яких це стосується
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
| Product | Affected Versions | Updated Version | Link to Update |
| Dell Secure Connect Gateway | 5.10.00.10 5.00.07.10 5.00.05.10 5.00.00.10 |
5.12.00.10 | https://www.dell.com/support/home/en-us/product-support/product/secure-connect-gateway-ve/drivers . |
Revision History
| Revision | Date | Description |
| 1.0 | 2022-07-26 | Initial Release |
Related Information
Заява про відмову від відповідальності
Продукти, яких це стосується
Secure Connect Gateway, Secure Connect Gateway - Virtual EditionПродукти
Product Security InformationВластивості статті
Article Number: 000201854
Article Type: Dell Security Advisory
Востаннє змінено: 19 вер. 2025
Отримайте відповіді на свої запитання від інших користувачів Dell
Служба підтримки
Перевірте, чи послуги служби підтримки поширюються на ваш пристрій.