DSA-2025-213: Security update for Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Multiple Third-Party Vulnerabilities

Zusammenfassung: Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) remediation is available for multiple multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system. ...

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

Critical

Details

Third-party Component CVEs More Information
Bind-utils CVE-2024-11187 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Cluster-md-kmp-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Curl CVE-2024-11053, CVE-2025-0167, CVE-2025-0725 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
dlm-kmp-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Emacs CVE-2025-1244 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
GLib2 CVE-2025-0395 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
grub2 CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2024-56737, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
kernel-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libbind9-160 CVE-2009-0696, CVE-2009-4022, CVE-2010-3613, CVE-2010-3614, CVE-2010-3615, CVE-2011-0414, CVE-2011-1907, CVE-2011-1910, CVE-2011-2464, CVE-2011-4313, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244, CVE-2012-5166, CVE-2012-5688, CVE-2012-5689, CVE-2013-2266, CVE-2013-4854, CVE-2014-0591, CVE-2014-8500, CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-8000, CVE-2015-8704, CVE-2016-1285, CVE-2016-1286, CVE-2016-2775, CVE-2016-2776, CVE-2016-6170, CVE-2016-8864, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3142, CVE-2017-3143, CVE-2017-3145, CVE-2018-5740, CVE-2018-5743, CVE-2018-5745, CVE-2019-6465, CVE-2019-6471, CVE-2020-8616, CVE-2020-8617, CVE-2024-11187 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libfreetype6 CVE-2025-27363 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_1 CVE-2024-13176 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libtasn1 CVE-2024-12133 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libX11 CVE-2025-26597 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libxml2 CVE-2022-49043, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Openssh8.4 CVE-2025-26465 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Oracle JRE 8u441 CVE-2025-0509 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Rsync CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Postgresql14 CVE-2025-1094 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Intel CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Avamar Data Store Gen4T (Single Node) SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Data Store Gen5A SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Virtual Edition SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Network Data Management Protocol (NDMP) Accelerator SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar VMware Image Backup Proxy SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Networker Virtual Edition (NVE) SUSE Linux Enterprise 12 SP5 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1
Dell PowerProtect DP Series Appliance (IDPA) SUSE Linux Enterprise 12 SP5 Versions prior to 2.7.8 Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1

 

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Avamar Data Store Gen4T (Single Node) SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Data Store Gen5A SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Virtual Edition SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Network Data Management Protocol (NDMP) Accelerator SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar VMware Image Backup Proxy SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Networker Virtual Edition (NVE) SUSE Linux Enterprise 12 SP5 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1
Dell PowerProtect DP Series Appliance (IDPA) SUSE Linux Enterprise 12 SP5 Versions prior to 2.7.8 Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1

 

Notes:

  1. The CVEs remedied in this security update are detailed in the Release Notes, which cover both the vulnerabilities addressed in this update and past vulnerabilities included in this cumulative update.
  2. Dell PowerProtect DP Series Appliance (IDPA) customers must upgrade to Version 2.7.8 available under Dell PowerProtect DP Series Appliance (IDPA), before applying the 2025-R1 security patches available under Avamar Proxy Bundle 2025-R1.
  3. For guidance on downloading and installing the latest Avamar Security Roll-up on Avamar Virtual Edition (AVE) systems using the EMC Avamar Installation Manager, refer to KB article 000169784: How to Install the Avamar Platform Security Rollup.
  4. To schedule a platform security patch installation or server upgrade, please contact Dell Customer Support.
  5. Additional product updates/releases are available in the Downloads section of their respective product pages. Dell recommends upgrading to the latest release/version of your product.

Known Issue:

  • Installation of 2025 R1 Operating System (OS) Security Rollup on Dell Avamar Data Store Gen4T (Multi-Node) is not recommended due to a known issue with GNU GRand Unified Bootloader (GRUB2) as detailed in the following KB Article.

Workarounds und Korrekturmaßnahmen

None

Revisionsverlauf

RevisionDateDescription
1.02025-05-30Initial Release
2.02025-06-20Minor update to reflect GRUB2 corruption in Avamar Data Store Gen4T (Multi-Node)
3.02025-07-31Minor formatting updates; No content changes

 

Zugehörige Informationen

Betroffene Produkte

Avamar, PowerProtect Data Protection Appliance, PowerProtect Data Manager Appliance, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
Artikeleigenschaften
Artikelnummer: 000326299
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 31 Juli 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.