Zu den Hauptinhalten
  • Bestellungen schnell und einfach aufgeben
  • Bestellungen anzeigen und den Versandstatus verfolgen
  • Profitieren Sie von exklusiven Prämien und Rabatten für Mitglieder
  • Erstellen Sie eine Liste Ihrer Produkte, auf die Sie jederzeit zugreifen können.

DSA-2024-022: Security Update for Dell NetWorker vProxy Multiple Component Vulnerabilities

Zusammenfassung: Dell NetWorker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

Critical

Details

Third-party Component CVEs More Information
bind CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
Linux kernel CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
libfastjson CVE-2020-12762 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
glib2 CVE-2024-34397 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
ucode-intel CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
glibc CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
python CVE-2022-48560, CVE-2023-27043, CVE-2023-52425, CVE-2024-0450 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
SUSE Manager Client Tools
Beta
CVE-2016-9566, CVE-2019-3698 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
less CVE-2024-32487 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
krb5 CVE-2021-37750 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 
curl CVE-2023-38545 See NVD link below for individual scores for each CVE.
http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. 

Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker vProxy vProxy OVA Versions 19.10 through 19.10.0.3
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.9 through 19.9.0.7
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.8 through 19.8.0.4 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions prior to 19.8 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
Product Software/Firmware Affected Versions Remediated Versions Link
NetWorker vProxy vProxy OVA Versions 19.10 through 19.10.0.3
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.9 through 19.9.0.7
 
Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions 19.8 through 19.8.0.4 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
NetWorker vProxy vProxy OVA Versions prior to 19.8 Version 19.11, 19.10.0.4 or later NetWorker 19.11 vProxy OVA,
NetWorker 19.10.0.4 vProxy OVA
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
  1. Platforms: Windows & Linux (All variants and flavors are impacted)
  2. Versions prior to 19.8 mean versions 19.7.x, 19.6.x, 19.5.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
  4. Dell advises that you consistently upgrade to the most recent release/version of your product.
  5. The security advisory has been updated in light of the release of Version 19.10.0.4, customers have the option to upgrade to any of the versions/releases specified in the "Affected Products and Remediation" section
  6. NOTE: Dell NetWorker vProxy 4.4.0-3 OVA is built on SUSE Linux Enterprise Server 15 SP4

Revisionsverlauf

RevisionDateDescription
1.02024-07-03 Initial Release
2.02024-07-31The security advisory has been updated in light of the release of Version 19.10.0.4

Zugehörige Informationen

Betroffene Produkte

NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security Information
Artikeleigenschaften
Artikelnummer: 000226633
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 31 Juli 2024
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.