Zu den Hauptinhalten
  • Bestellungen schnell und einfach aufgeben
  • Bestellungen anzeigen und den Versandstatus verfolgen
  • Profitieren Sie von exklusiven Prämien und Rabatten für Mitglieder
  • Erstellen Sie eine Liste Ihrer Produkte, auf die Sie jederzeit zugreifen können.

DSA-2025-213: Security update for Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Multiple Third-Party Vulnerabilities

Zusammenfassung: Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system. ...

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

Critical

Details

Third-party Component

CVEs

More Information

Bind-utils

CVE-2024-11187

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Cluster-md-kmp-default

CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Curl

CVE-2024-11053, CVE-2025-0167, CVE-2025-0725

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

dlm-kmp-default

CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Emacs

CVE-2025-1244

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

GLib2

CVE-2025-0395

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

grub2

CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2024-56737, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

kernel-default

 

CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

libbind9-160

CVE-2009-0696, CVE-2009-4022, CVE-2010-3613, CVE-2010-3614, CVE-2010-3615, CVE-2011-0414, CVE-2011-1907, CVE-2011-1910, CVE-2011-2464, CVE-2011-4313, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244, CVE-2012-5166, CVE-2012-5688, CVE-2012-5689, CVE-2013-2266, CVE-2013-4854, CVE-2014-0591, CVE-2014-8500, CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-8000, CVE-2015-8704, CVE-2016-1285, CVE-2016-1286, CVE-2016-2775, CVE-2016-2776, CVE-2016-6170, CVE-2016-8864, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3142, CVE-2017-3143, CVE-2017-3145, CVE-2018-5740, CVE-2018-5743, CVE-2018-5745, CVE-2019-6465, CVE-2019-6471, CVE-2020-8616, CVE-2020-8617, CVE-2024-11187

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libfreetype6

CVE-2025-27363

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libopenssl1_1

 

CVE-2024-13176

 

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libtasn1

CVE-2024-12133

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libX11

CVE-2025-26597

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libxml2

CVE-2022-49043, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Openssh8.4

CVE-2025-26465

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Oracle JRE 8u441

CVE-2025-0509

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Rsync

CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Postgresql14

CVE-2025-1094

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

Intel

CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355

 

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

Dell Avamar Data Store Gen4T (Single Node)

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

 

 

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Data Store Gen5A

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Virtual Edition

SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments)

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Network Data Management Protocol (NDMP) Accelerator

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar VMware Image Backup Proxy

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Networker Virtual Edition (NVE)

SUSE Linux Enterprise 12 SP5

Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12

Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1

NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1

Dell PowerProtect DP Series Appliance (IDPA)

SUSE Linux Enterprise 12 SP5

Versions prior to 2.7.8

Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

 

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

Dell Avamar Data Store Gen4T (Single Node)

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

 

 

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Data Store Gen5A

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Virtual Edition

SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments)

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar Network Data Management Protocol (NDMP) Accelerator

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Avamar VMware Image Backup Proxy

SUSE Linux Enterprise 12 SP5

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9

Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

Dell Networker Virtual Edition (NVE)

SUSE Linux Enterprise 12 SP5

Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12

Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1

NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1

Dell PowerProtect DP Series Appliance (IDPA)

SUSE Linux Enterprise 12 SP5

Versions prior to 2.7.8

Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1

Avamar Proxy Bundle 2025-R1

 

Notes:

  1. The CVEs remedied in this security update are detailed in the Release Notes, which include both newly remedied and past vulnerabilities included in this cumulative update.
  2. Dell PowerProtect DP Series Appliance (IDPA) customers must upgrade to Version 2.7.8 available under Dell PowerProtect DP Series Appliance (IDPA), before applying the 2025-R1 security patches available under Avamar Proxy Bundle 2025-R1.
  3. For guidance on downloading and installing the latest Avamar Security Roll-up on Avamar Virtual Edition (AVE) systems using the EMC Avamar Installation Manager, refer to the article How to Install the Avamar Platform Security Rollup.
  4. To schedule a platform security patch installation or server upgrade, please contact Dell Customer Support.
  5. Additional product updates/releases are available in the Downloads section of their respective product pages. Dell recommends upgrading to the latest release/version of your product.

Known Issue:

  • Installation of 2025 R1 Operating System (OS) Security Rollup on Dell Avamar Data Store Gen4T (Multi-Node) is not recommended due to a known issue with GNU GRand Unified Bootloader (GRUB2) as detailed in the following KB Article.

Workarounds und Korrekturmaßnahmen

None

Revisionsverlauf

Revision

Date

Description

1.0

2025-05-30

Initial Release

2.0

2025-06-20

Minor update to reflect GRUB2 corruption in Avamar Data Store Gen4T (Multi-Node)

Zugehörige Informationen

Betroffene Produkte

Avamar, PowerProtect Data Protection Appliance, PowerProtect Data Manager Appliance, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
Artikeleigenschaften
Artikelnummer: 000326299
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 19 Juni 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.