DSA-2024-031: Security Update for Dell Data Protection Search for Multiple Third-Party Component Vulnerabilities
Oversigt: Dell Data Protection Search remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Denne artikel gælder for
Denne artikel gælder ikke for
Denne artikel er ikke knyttet til et bestemt produkt.
Det er ikke alle produktversioner, der er identificeret i denne artikel.
Virkning
Critical
Oplysninger
| Third-party Component | CVEs | More Information |
|---|---|---|
| Oracle JRE | CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| vim | CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| openssl | CVE-2022-2068, CVE-2022-1292 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Kernel-default | CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| SSH Terrapin | CVE-2023-48795, CVE-2023-46445, CVE-2023-46446 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libxslt | CVE-2021-30560 | https://nvd.nist.gov/vuln/detail/CVE-2021-30560 |
| cifs-utils | CVE-2022-27239 | https://nvd.nist.gov/vuln/detail/CVE-2022-27239 |
| glibc | CVE-2022-23219, CVE-2022-23218 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| binutils | CVE-2021-45078, CVE-2022-2440 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| nss, mozilla | CVE-2021-43527 | https://nvd.nist.gov/vuln/detail/CVE-2021-43527 |
| rsyslog | CVE-2022-24903 | https://nvd.nist.gov/vuln/detail/CVE-2022-24903 |
| e2fsprogs | CVE-2022-1304 | https://nvd.nist.gov/vuln/detail/cve-2022-1304 |
| augeas | CVE-2017-7555 | https://nvd.nist.gov/vuln/detail/CVE-2017-7555 |
| cyrus SASL | CVE-2022-24407 | https://nvd.nist.gov/vuln/detail/CVE-2022-24407 |
| grub2 | CVE-2022-3696 | https://nvd.nist.gov/vuln/detail/CVE-2022-3696 |
| open-vm-tools | CVE-2023-0286 | https://nvd.nist.gov/vuln/detail/CVE-2023-0286 |
| curl | CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-46218, CVE-2023-46219 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| samba | CVE-2020-25717 | https://nvd.nist.gov/vuln/detail/CVE-2020-25717 |
| libtiff5 | CVE-2020-35524, CVE-2020-35523 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libldpa | CVE-2022-29155 | https://nvd.nist.gov/vuln/detail/CVE-2022-29155 |
| libexif12 | CVE-2020-0452 | https://nvd.nist.gov/vuln/detail/CVE-2020-0452 |
| zlib | CVE-2023-45853 | https://nvd.nist.gov/vuln/detail/CVE-2021-45853 |
| ApacheLog4j | CVE-2021-44832 | https://nvd.nist.gov/vuln/detail/CVE-2021-44832 |
| LdapSettings.get_ldap_info | CVE-2024-22433 | https://nvd.nist.gov/vuln/detail/CVE-2024-22433 |
Berørte produkter og udbedring
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | Dell Data Protection Search | Versions 19.3.0, 19.4.0, 19.5.0, 19.5.1, 19.6.0, 19.6.1, 19.6.2, 19.6.3, and 19.6.4 | Version 19.6.5 or later | https://dl.dell.com/downloads/W7JCP_Search-19.6.5-upgrade-package.ova |
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | IDPA | Versions prior to 2.7.6 | Version 2.7.6 with DP Search 19.6.5 | https://dl.dell.com/downloads/3F82V_Search-19.6.5-upgrade-package.zip |
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | Dell Data Protection Search | Versions 19.3.0, 19.4.0, 19.5.0, 19.5.1, 19.6.0, 19.6.1, 19.6.2, 19.6.3, and 19.6.4 | Version 19.6.5 or later | https://dl.dell.com/downloads/W7JCP_Search-19.6.5-upgrade-package.ova |
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | IDPA | Versions prior to 2.7.6 | Version 2.7.6 with DP Search 19.6.5 | https://dl.dell.com/downloads/3F82V_Search-19.6.5-upgrade-package.zip |
- To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home
- IDPA 2.7.6 and prior versions are impacted. Fix will be available in the upcoming IDPA release.
- Dell advises that you consistently upgrade to the most recent release/version of your product.
Revisionshistorik
| Revision | Date | Description |
| 1.0 | 2024-07-15 | Initial Release |
| 2.0 | 2024-07-30 | Updated for enhanced format presentation with no change to content |
Relaterede oplysninger
Ansvarsfraskrivelse
Berørte produkter
Data Protection Search, PowerProtect Data Protection Appliance, Data Protection Search, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware
, Integrated Data Protection Appliance Software, Product Security Information
...
Artikelegenskaber
Artikelnummer: 000226918
Artikeltype: Dell Security Advisory
Senest ændret: 09 sep. 2025
Find svar på dine spørgsmål fra andre Dell-brugere
Supportservices
Kontrollér, om din enhed er dækket af supportservices.