Ga naar hoofdinhoud
  • Snel en eenvoudig bestellen
  • Bestellingen en de verzendstatus bekijken
  • Een lijst met producten maken en openen
  • Beheer uw Dell EMC locaties, producten en contactpersonen op productniveau met Company Administration.

Artikelnummer: 000221476


DSA-2024-058 : Security Update for Dell Networker vProxy Multiple Components Vulnerabilities

Samenvatting: Dell Networker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Article content


Impact

High

Gegevens

Third-party Component CVEs More Information
OpenSSH CVE-2016-20012, CVE-2020-15778, CVE-2021-36368 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
libvmtools CVE-2023-20900 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
SUSE kernel CVE-2023-5717 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
zlib CVE-2023-45853 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
python CVE-2022-48565, CVE-2022-48566 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
libcares2 CVE-2020-22217, CVE-2022-4904 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
sqlite3 CVE-2023-2137 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
vim CVE-2023-5535, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
ucode-intel CVE-2023-23583 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
open-vm-tools CVE-2023-34058, CVE-2023-34059, CVE-2023-20900 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
nghttp2 CVE-2023-44487 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
suse-module-tools CVE-2023-1829, CVE-2023-23559 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
grub2 CVE-2023-4692, CVE-2023-4693 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
Kernel CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
shadow CVE-2023-4641 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
gpg2 CVE-2018-9234 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
nghttp2 CVE-2023-35945 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
bind CVE-2023-3341 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
curl CVE-2023-38039 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 
gawk CVE-2023-4156 See NVD link below for individual scores for each CVE. 
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
 

Dell Technologies raadt aan dat alle klanten rekening houden met zowel de basisscore van CVSS als alle relevante tijdelijke en omgevingsscores die gevolgen kunnen hebben voor de mogelijke ernst van de specifieke beveiligingsproblemen.

Getroffen producten en herstel

CVEs Addressed Product Software/Firmware Affected Versions Remediated Versions Link
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156
 
NetWorker vProxy vProxy OVA
 
Versions 19.9 through 19.9.0.3
 
Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions 19.8 through 19.8.0.4 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions 19.7 through 19.7.0.5 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Version 19.7.1 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions prior to 19.7 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVEs Addressed Product Software/Firmware Affected Versions Remediated Versions Link
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156
 
NetWorker vProxy vProxy OVA
 
Versions 19.9 through 19.9.0.3
 
Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions 19.8 through 19.8.0.4 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions 19.7 through 19.7.0.5 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Version 19.7.1 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 NetWorker vProxy vProxy OVA
 
Versions prior to 19.7 Versions 19.9.0.4, 19.10 or later Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova,

Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
  1. Platforms: vProxy is built upon SUSE based Linux operating system. So it supports only Linux platform.
  2. Versions prior to 19.7 means versions 19.6.x, 19.5.x, 19.4.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
  4. Dell recommends that you always upgrade to the latest release/version for your product

Revisiegeschiedenis

Revision DateDescription
1.02024-01-25Initial Release

Verwante informatie


Artikeleigenschappen


Getroffen product

NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security Information

Datum laatst gepubliceerd

23 feb. 2024

Versie

2

Artikeltype

Dell Security Advisory