DSA-2024-022: Security Update for Dell NetWorker vProxy Multiple Component Vulnerabilities
Zusammenfassung: Dell NetWorker vProxy remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Dieser Artikel gilt für
Dieser Artikel gilt nicht für
Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden.
In diesem Artikel werden nicht alle Produktversionen aufgeführt.
Auswirkungen
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| bind | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| Linux kernel | CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libfastjson | CVE-2020-12762 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| glib2 | CVE-2024-34397 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| ucode-intel | CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python | CVE-2022-48560, CVE-2023-27043, CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| SUSE Manager Client Tools Beta |
CVE-2016-9566, CVE-2019-3698 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| less | CVE-2024-32487 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| krb5 | CVE-2021-37750 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| curl | CVE-2023-38545 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
Betroffene Produkte und Korrektur
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| NetWorker vProxy | vProxy OVA | Versions 19.10 through 19.10.0.3 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.9 through 19.9.0.7 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.8 through 19.8.0.4 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions prior to 19.8 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| NetWorker vProxy | vProxy OVA | Versions 19.10 through 19.10.0.3 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.9 through 19.9.0.7 |
Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions 19.8 through 19.8.0.4 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
| NetWorker vProxy | vProxy OVA | Versions prior to 19.8 | Version 19.11, 19.10.0.4 or later | NetWorker 19.11 vProxy OVA, NetWorker 19.10.0.4 vProxy OVA |
The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.
- Platforms: Windows & Linux (All variants and flavors are impacted)
- Versions prior to 19.8 mean versions 19.7.x, 19.6.x, 19.5.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
- Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
- Dell advises that you consistently upgrade to the most recent release/version of your product.
- The security advisory has been updated in light of the release of Version 19.10.0.4, customers have the option to upgrade to any of the versions/releases specified in the "Affected Products and Remediation" section
- NOTE: Dell NetWorker vProxy 4.4.0-3 OVA is built on SUSE Linux Enterprise Server 15 SP4
Revisionsverlauf
| Revision | Date | Description |
| 1.0 | 2024-07-03 | Initial Release |
| 2.0 | 2024-07-31 | The security advisory has been updated in light of the release of Version 19.10.0.4 |
Zugehörige Informationen
Rechtlicher Hinweis
Betroffene Produkte
NetWorker Family, NetWorker, NetWorker Series, NetWorker Module, Product Security InformationArtikeleigenschaften
Artikelnummer: 000226633
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 09 Sept. 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.