mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-17 14:27:54 +00:00
Update Dell to Ansible Modules
This commit is contained in:
parent
f9cb625c7d
commit
2f15a136a7
1 changed files with 29 additions and 26 deletions
|
@ -3302,7 +3302,9 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- '"<6.0.0 6.1.0 6.2.x"'
|
- '<6.0.0'
|
||||||
|
- '6.1.0'
|
||||||
|
- '6.2.x'
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3319,7 +3321,7 @@ software:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: See DSA-2021-278
|
notes: See DSA-2021-278
|
||||||
references:
|
references:
|
||||||
- ''
|
- '[DSA-2021-278](https://www.dell.com/support/kbdoc/en-us/000194488/dsa-2021-278)'
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
- vendor: Dell
|
- vendor: Dell
|
||||||
product: Dell EMC GeoDrive
|
product: Dell EMC GeoDrive
|
||||||
|
@ -3334,7 +3336,7 @@ software:
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions:
|
unaffected_versions:
|
||||||
- N/A
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
@ -3362,7 +3364,7 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- N/A
|
- ''
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3377,13 +3379,12 @@ software:
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
vendor_links:
|
vendor_links:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: '"Dell EMC Integrated System for Azure Stack HCI is not impacted by this
|
notes: Dell EMC Integrated System for Azure Stack HCI is not impacted by this
|
||||||
advisory. If Dell EMC SupportAssist Enterprise (SAE) or Dell EMC Secure Connect
|
advisory. If Dell EMC SupportAssist Enterprise (SAE) or Dell EMC Secure Connect
|
||||||
Gateway (SCG) were optionally installed with Dell EMC Integrated System for
|
Gateway (SCG) were optionally installed with Dell EMC Integrated System for
|
||||||
Azure Stack HCI monitor the following advisories. Apply workaround guidance
|
Azure Stack HCI monitor the following advisories. See DSA-2021-307.
|
||||||
and remediations as they become [available:](https://www.dell.com/support/kbdoc/en-us/000194622/dsa-2021-307-dell-emc-integrated-system-for-azure-stack-hci-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
|
||||||
references:
|
references:
|
||||||
- ''
|
- '[DSA-2021-307](https://www.dell.com/support/kbdoc/en-us/000194622/dsa-2021-307-dell-emc-integrated-system-for-azure-stack-hci-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
- vendor: Dell
|
- vendor: Dell
|
||||||
product: Dell EMC Integrated System for Microsoft Azure Stack Hub
|
product: Dell EMC Integrated System for Microsoft Azure Stack Hub
|
||||||
|
@ -3396,7 +3397,7 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- N/A
|
- ''
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3411,7 +3412,7 @@ software:
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
vendor_links:
|
vendor_links:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: Patch pending
|
notes: Patch expected by 2022-01-31.
|
||||||
references:
|
references:
|
||||||
- ''
|
- ''
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
|
@ -3428,7 +3429,7 @@ software:
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions:
|
unaffected_versions:
|
||||||
- N/A
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
@ -3458,7 +3459,7 @@ software:
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions:
|
unaffected_versions:
|
||||||
- N/A
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
@ -3486,7 +3487,7 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- 7.0.x
|
- 'Versions before 7.0.1 P2'
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3503,10 +3504,10 @@ software:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: See DSA-2021-308
|
notes: See DSA-2021-308
|
||||||
references:
|
references:
|
||||||
- ''
|
- '[DSA-2021-308](https://www.dell.com/support/kbdoc/en-us/000194630/dsa-2021)'
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
- vendor: Dell
|
- vendor: Dell
|
||||||
product: Dell EMC NetWorker Server
|
product: Dell EMC NetWorker
|
||||||
cves:
|
cves:
|
||||||
cve-2021-4104:
|
cve-2021-4104:
|
||||||
investigated: false
|
investigated: false
|
||||||
|
@ -3516,7 +3517,8 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- '"19.5.x 19.4.x 19.3.x"'
|
- '19.4.x'
|
||||||
|
- '19.5.x'
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3533,10 +3535,10 @@ software:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: Patch expected by 12/20/21
|
notes: Patch expected by 12/20/21
|
||||||
references:
|
references:
|
||||||
- ''
|
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
- vendor: Dell
|
- vendor: Dell
|
||||||
product: Dell EMC NetWorker Virtual Edition
|
product: Dell EMC NetWorker VE
|
||||||
cves:
|
cves:
|
||||||
cve-2021-4104:
|
cve-2021-4104:
|
||||||
investigated: false
|
investigated: false
|
||||||
|
@ -3546,7 +3548,8 @@ software:
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions:
|
||||||
- '"19.5.x 19.4.x 19.3.x"'
|
- '19.4.x'
|
||||||
|
- '19.5.x'
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
|
@ -3563,7 +3566,7 @@ software:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: Patch expected by 12/20/21
|
notes: Patch expected by 12/20/21
|
||||||
references:
|
references:
|
||||||
- ''
|
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
- vendor: Dell
|
- vendor: Dell
|
||||||
product: Dell EMC Networking Onie
|
product: Dell EMC Networking Onie
|
||||||
|
@ -3578,7 +3581,7 @@ software:
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions:
|
unaffected_versions:
|
||||||
- N/A
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
@ -3605,10 +3608,10 @@ software:
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: true
|
investigated: true
|
||||||
affected_versions:
|
affected_versions: []
|
||||||
- '"with Versa Concerto with Versa Analytics with Versa Concero Director"'
|
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions:
|
||||||
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
@ -3621,7 +3624,7 @@ software:
|
||||||
unaffected_versions: []
|
unaffected_versions: []
|
||||||
vendor_links:
|
vendor_links:
|
||||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||||
notes: See DSA-2021-304
|
notes: ''
|
||||||
references:
|
references:
|
||||||
- ''
|
- ''
|
||||||
last_updated: '2021-12-15T00:00:00'
|
last_updated: '2021-12-15T00:00:00'
|
||||||
|
@ -3638,7 +3641,7 @@ software:
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions:
|
unaffected_versions:
|
||||||
- N/A
|
- ''
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: false
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
|
|
Loading…
Reference in a new issue