DSA-2024-348: Security update for Dell Avamar, NetWorker Virtual Edition and PowerProtect DP Series Appliance / Dell IDPA Security Update for Multiple Vulnerabilities
Zusammenfassung: Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance /Integrated Data Protection Appliance (IDPA) remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system. ...
Dieser Artikel gilt für
Dieser Artikel gilt nicht für
Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden.
In diesem Artikel werden nicht alle Produktversionen aufgeführt.
Auswirkungen
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| Oracle JRE 8u411 | CVE-2023-41993, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21085, CVE-2024-21094 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| kernel-default |
CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42445, CVE-2023-4244, CVE-2023-42755, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52527, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52586, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26625, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26828, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26874, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26948, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26993, CVE-2024-26996, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Apache2-prefork & Apache2-utils | CVE-2023-38709, CVE-2024-24795, CVE-2024-27316 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Apache2-mod_jk | CVE-2018-1323, CVE-2023-41081 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Bind-utils | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Cups | CVE-2024-35235 | https://nvd.nist.gov/vuln/detail/CVE-2024-35235 |
| Curl | CVE-2024-2004, CVE-2024-2398 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Emacs | CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Gdk-pixbuf-lang | CVE-2022-48622 | https://nvd.nist.gov/vuln/detail/CVE-2022-48622 |
| Artifex Ghostscript | CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| GLib2 |
CVE-2024-34397 | https://nvd.nist.gov/vuln/detail/CVE-2024-34397 |
| Glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Krb5 | CVE-2021-37750, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| less | CVE-2022-48624, CVE-2024-32487 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libarchive13 | CVE-2024-20696 | https://nvd.nist.gov/vuln/detail/CVE-2024-20696 |
| libavahi | CVE-2023-38470, CVE-2023-38472 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libcares2 | CVE-2024-25629 | https://nvd.nist.gov/vuln/detail/CVE-2024-25629 |
| libfastjson4 | CVE-2020-12762 | https://nvd.nist.gov/vuln/detail/CVE-2020-12762 |
| libjasper1 | CVE-2024-31744 | https://nvd.nist.gov/vuln/detail/CVE-2024-31744 |
| libnghttp2-14 | CVE-2024-28182 | https://nvd.nist.gov/vuln/detail/CVE-2024-28182 |
| libopenssl1_0_0 | CVE-2024-0727 | https://nvd.nist.gov/vuln/detail/CVE-2024-0727 |
| libopenssl1_1 | CVE-2024-4741 | https://nvd.nist.gov/vuln/detail/CVE-2024-4741 |
| libtiff5 |
CVE-2023-3164 | https://nvd.nist.gov/vuln/detail/CVE-2023-3164 |
| libxml2-2 |
CVE-2024-34459 | https://nvd.nist.gov/vuln/detail/CVE-2024-34459 |
| libvirt-libs | CVE-2024-2494 | https://nvd.nist.gov/vuln/detail/CVE-2024-2494 |
| libzypp | CVE-2017-9271 |
https://nvd.nist.gov/vuln/detail/CVE-2017-9271 |
| Opensc | CVE-2023-5992 | https://nvd.nist.gov/vuln/detail/CVE-2023-5992 |
| Postfix | CVE-2023-51764 |
https://nvd.nist.gov/vuln/detail/CVE-2023-51764 |
| postgresql14 | CVE-2024-4317 | https://nvd.nist.gov/vuln/detail/CVE-2024-4317 |
| python | CVE-2022-48560, CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| python3 | CVE-2022-48566, CVE-2023-6597, CVE-2024-0397, CVE-2024-4032 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| python-requests | CVE-2024-35195 | https://nvd.nist.gov/vuln/detail/CVE-2024-35195 |
| sssd | CVE-2023-3758 | https://nvd.nist.gov/vuln/detail/CVE-2023-3758 |
| terminfo | CVE-2023-45918 | https://nvd.nist.gov/vuln/detail/CVE-2023-45918 |
| util-linux | CVE-2024-28085 | https://nvd.nist.gov/vuln/detail/CVE-2024-28085 |
| ucode-intel | CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| wget | CVE-2024-38428 | https://nvd.nist.gov/vuln/detail/CVE-2024-38428 |
Betroffene Produkte und Korrektur
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
| Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
| Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
| Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
| Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
- The CVEs remedied by this security update are listed in the Release Notes. The Release Notes list not only the new CVEs remedied by this update, but all the past CVEs included in this cumulative update.
- For Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Customers, Upgrade to PowerProtect DP 2.7.6 is strongly recommended prior to applying additional security patches. The patches can also be applied to the Appliances running PowerProtect DP 2.7.2 (all models) and PowerProtect DP 2.7.4 (DP4400 model only).
- Dell recommends that you always upgrade to the latest release/version for your product.
- To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home/product-support/product/avamar/drivers
Revisionsverlauf
| Revision | Date | Description |
| 1.0 | 2024-08-06 | Initial Release |
Zugehörige Informationen
Rechtlicher Hinweis
Betroffene Produkte
Avamar, NetWorker Family, PowerProtect Data Protection Appliance, Avamar, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, Avamar Server, Avamar Virtual Edition, PowerProtect Data Protection Software
, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software, NetWorker, NetWorker Series, NetWorker Module, Product Security Information
...
Artikeleigenschaften
Artikelnummer: 000227573
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 06 Nov. 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.