DSA-2024-058 : Security Update for Dell Networker vProxy Multiple Components Vulnerabilities
Zusammenfassung: Dell Networker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Dieser Artikel gilt für
Dieser Artikel gilt nicht für
Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden.
In diesem Artikel werden nicht alle Produktversionen aufgeführt.
Auswirkungen
High
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| OpenSSH | CVE-2016-20012, CVE-2020-15778, CVE-2021-36368 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libvmtools | CVE-2023-20900 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| SUSE kernel | CVE-2023-5717 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| zlib | CVE-2023-45853 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python | CVE-2022-48565, CVE-2022-48566 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libcares2 | CVE-2020-22217, CVE-2022-4904 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| sqlite3 | CVE-2023-2137 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| vim | CVE-2023-5535, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| ucode-intel | CVE-2023-23583 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| open-vm-tools | CVE-2023-34058, CVE-2023-34059, CVE-2023-20900 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| nghttp2 | CVE-2023-44487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| suse-module-tools | CVE-2023-1829, CVE-2023-23559 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| grub2 | CVE-2023-4692, CVE-2023-4693 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Kernel | CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| shadow | CVE-2023-4641 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| gpg2 | CVE-2018-9234 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| nghttp2 | CVE-2023-35945 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| bind | CVE-2023-3341 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| curl | CVE-2023-38039 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| gawk | CVE-2023-4156 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Betroffene Produkte und Korrektur
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|---|
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 |
NetWorker vProxy | vProxy OVA |
Versions 19.9 through 19.9.0.3 |
Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.8 through 19.8.0.4 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.7 through 19.7.0.5 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Version 19.7.1 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions prior to 19.7 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVEs Addressed | Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|---|
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 |
NetWorker vProxy | vProxy OVA |
Versions 19.9 through 19.9.0.3 |
Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.8 through 19.8.0.4 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions 19.7 through 19.7.0.5 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Version 19.7.1 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
| CVE-2016-20012, CVE-2020-15778, CVE-2021-36368, CVE-2023-20900, CVE-2023-5717, CVE-2023-45853, CVE-2022-48565, CVE-2022-48566, CVE-2020-22217, CVE-2023-2137, CVE-2023-5535, CVE-2023-23583, CVE-2023-34058, CVE-2023-34059, CVE-2023-44487, CVE-2023-1829, CVE-2023-23559, CVE-2023-4692, CVE-2023-4693, CVE-2020-36766, CVE-2023-0394, CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42754, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-4641, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2018-9234, CVE-2023-35945, CVE-2023-20900, CVE-2023-3341, CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459, CVE-2023-38039, CVE-2023-1127, CVE-2023-1264, CVE-2023-1355, CVE-2023-2426, CVE-2023-2609, CVE-2023-2610, CVE-2022-4904, CVE-2023-4156 | NetWorker vProxy | vProxy OVA |
Versions prior to 19.7 | Versions 19.9.0.4, 19.10 or later | Please refer to installation version NetWorker 19.10 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova, Please refer to installation version NetWorker 19.9.0.4 vProxy OVA with the description Linux SLES12 SP5 (64-bit). NetWorker vProxy virtual appliance. Version 4.3.0-54.ova |
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Platforms: vProxy is built upon SUSE based Linux operating system. So it supports only Linux platform.
- Versions prior to 19.7 means versions 19.6.x, 19.5.x, 19.4.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
- Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
- Dell recommends that you always upgrade to the latest release/version for your product
Revisionsverlauf
| Revision | Date | Description |
| 1.0 | 2024-01-25 | Initial Release |
Zugehörige Informationen
Rechtlicher Hinweis
Betroffene Produkte
NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security InformationArtikeleigenschaften
Artikelnummer: 000221476
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 09 Sept. 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.