Impact
Critical
Details
Third-party Component |
CVEs |
More information |
kernel |
CVE-2021-4028 |
See NVD (http://nvd.nist.gov/ ) for individual scores for each CVE. |
CVE-2021-4083 |
CVE-2022-0492 |
CVE-2020-0465 |
CVE-2020-0466 |
CVE-2021-0920 |
CVE-2021-3564 |
CVE-2021-3573 |
CVE-2021-3752 |
CVE-2021-4155 |
CVE-2022-0330 |
CVE-2022-22942 |
libxml2 |
CVE-2016-4658 |
|
libX11 |
CVE-2021-31535 |
|
httpd |
CVE-2021-40438 |
|
CVE-2022-22720 |
CVE-2021-26691 |
CVE-2021-34798 |
CVE-2021-39275 |
CVE-2021-44790 |
nss |
CVE-2021-43527 |
|
CVE-2020-25648 |
sssd |
CVE-2021-3621 |
|
xorg-x11-server |
CVE-2021-3472 |
|
CVE-2021-4008 |
CVE-2021-4009 |
CVE-2021-4010 |
CVE-2021-4011 |
java-1.8.0-openjdk |
CVE-2022-21248 |
|
CVE-2022-21282 |
CVE-2022-21283 |
CVE-2022-21293 |
CVE-2022-21294 |
CVE-2022-21296 |
CVE-2022-21299 |
CVE-2022-21305 |
CVE-2022-21340 |
CVE-2022-21341 |
CVE-2022-21360 |
CVE-2022-21365 |
polkit |
CVE-2021-4034 |
|
openssl |
CVE-2021-3712 |
|
CVE-2022-0778 |
rpm |
CVE-2021-20271 |
|
openldap |
CVE-2020-25692 |
|
CVE-2020-25709 |
CVE-2020-25710 |
Ansible |
CVE-2021-3620 |
|
openssh |
CVE-2021-41617 |
|
nettle |
CVE-2021-20305 |
|
CVE-2021-20305 |
binutils |
CVE-2021-42574 |
|
bind |
CVE-2021-25214 |
|
CVE-2021-25215 |
microcode_ctl |
CVE-2020-0543 |
|
CVE-2020-0548 |
CVE-2020-0549 |
CVE-2020-24489 |
CVE-2020-24511 |
CVE-2020-24512 |
CVE-2020-8695 |
CVE-2020-8696 |
CVE-2020-8698 |
CVE-2020-24489 |
CVE-2020-24511 |
CVE-2020-24512 |
CVE-2020-24513 |
Krb5 |
CVE-2021-37750 |
|
glib2 |
CVE-2021-27219 |
|
cyrus-sasl |
CVE-2022-24407 |
|
gzip |
CVE-2022-1271 |
|
zlib |
CVE-2018-25032 |
|
rsyslog |
CVE-2022-24903 |
|
postgresql |
CVE-2019-10208 |
|
CVE-2020-25694 |
CVE-2020-25695 |
CVE-2021-32027 |
CVE-2022-1552 |
xz |
CVE-2022-1271 |
|
expat |
CVE-2021-45960 |
|
CVE-2021-46143 |
CVE-2022-22822 |
CVE-2022-22823 |
CVE-2022-22824 |
CVE-2022-22825 |
CVE-2022-22826 |
CVE-2022-22827 |
CVE-2022-23852 |
CVE-2022-25235 |
CVE-2022-25236 |
CVE-2022-25315 |
INTEL-TA-00525 |
CVE-2020-0592 |
|
CVE-2020-8738 |
CVE-2020-8740 |
CVE-2020-8764 |
CVE-2020-12357 |
CVE-2020-12360 |
CVE-2021-0092 |
CVE-2021-0144 |
Third-party Component |
CVEs |
More information |
kernel |
CVE-2021-4028 |
See NVD (http://nvd.nist.gov/ ) for individual scores for each CVE. |
CVE-2021-4083 |
CVE-2022-0492 |
CVE-2020-0465 |
CVE-2020-0466 |
CVE-2021-0920 |
CVE-2021-3564 |
CVE-2021-3573 |
CVE-2021-3752 |
CVE-2021-4155 |
CVE-2022-0330 |
CVE-2022-22942 |
libxml2 |
CVE-2016-4658 |
|
libX11 |
CVE-2021-31535 |
|
httpd |
CVE-2021-40438 |
|
CVE-2022-22720 |
CVE-2021-26691 |
CVE-2021-34798 |
CVE-2021-39275 |
CVE-2021-44790 |
nss |
CVE-2021-43527 |
|
CVE-2020-25648 |
sssd |
CVE-2021-3621 |
|
xorg-x11-server |
CVE-2021-3472 |
|
CVE-2021-4008 |
CVE-2021-4009 |
CVE-2021-4010 |
CVE-2021-4011 |
java-1.8.0-openjdk |
CVE-2022-21248 |
|
CVE-2022-21282 |
CVE-2022-21283 |
CVE-2022-21293 |
CVE-2022-21294 |
CVE-2022-21296 |
CVE-2022-21299 |
CVE-2022-21305 |
CVE-2022-21340 |
CVE-2022-21341 |
CVE-2022-21360 |
CVE-2022-21365 |
polkit |
CVE-2021-4034 |
|
openssl |
CVE-2021-3712 |
|
CVE-2022-0778 |
rpm |
CVE-2021-20271 |
|
openldap |
CVE-2020-25692 |
|
CVE-2020-25709 |
CVE-2020-25710 |
Ansible |
CVE-2021-3620 |
|
openssh |
CVE-2021-41617 |
|
nettle |
CVE-2021-20305 |
|
CVE-2021-20305 |
binutils |
CVE-2021-42574 |
|
bind |
CVE-2021-25214 |
|
CVE-2021-25215 |
microcode_ctl |
CVE-2020-0543 |
|
CVE-2020-0548 |
CVE-2020-0549 |
CVE-2020-24489 |
CVE-2020-24511 |
CVE-2020-24512 |
CVE-2020-8695 |
CVE-2020-8696 |
CVE-2020-8698 |
CVE-2020-24489 |
CVE-2020-24511 |
CVE-2020-24512 |
CVE-2020-24513 |
Krb5 |
CVE-2021-37750 |
|
glib2 |
CVE-2021-27219 |
|
cyrus-sasl |
CVE-2022-24407 |
|
gzip |
CVE-2022-1271 |
|
zlib |
CVE-2018-25032 |
|
rsyslog |
CVE-2022-24903 |
|
postgresql |
CVE-2019-10208 |
|
CVE-2020-25694 |
CVE-2020-25695 |
CVE-2021-32027 |
CVE-2022-1552 |
xz |
CVE-2022-1271 |
|
expat |
CVE-2021-45960 |
|
CVE-2021-46143 |
CVE-2022-22822 |
CVE-2022-22823 |
CVE-2022-22824 |
CVE-2022-22825 |
CVE-2022-22826 |
CVE-2022-22827 |
CVE-2022-23852 |
CVE-2022-25235 |
CVE-2022-25236 |
CVE-2022-25315 |
INTEL-TA-00525 |
CVE-2020-0592 |
|
CVE-2020-8738 |
CVE-2020-8740 |
CVE-2020-8764 |
CVE-2020-12357 |
CVE-2020-12360 |
CVE-2021-0092 |
CVE-2021-0144 |
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
Workarounds & Mitigations
Dell Software:
Only Dell Data Computing Appliance (DCA) version 4.0.0.0, 4.1.0.0, 4.2.0.0, and 4.2.1.0 can be upgraded to version 4.3.0.0 and then can be upgraded to 4.3.1.0.
To upgrade to an earlier DCA version, you must migrate to version 4.0.0.0 (THEL7), upgrade to version 4.3.0.0, and then upgrade to 4.3.1.0.
Revision History
Revision | Date | Description |
1.0 | 2022-08-02 | Initial release |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
Affected Products
Data Computing Appliance V3, Product Security Information