DSA-2025-213: Security update for Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Multiple Third-Party Vulnerabilities
Zusammenfassung: Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) remediation is available for multiple multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system. ...
Dieser Artikel gilt für
Dieser Artikel gilt nicht für
Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden.
In diesem Artikel werden nicht alle Produktversionen aufgeführt.
Auswirkungen
Critical
Details
| Third-party Component | CVEs | More Information |
| Bind-utils | CVE-2024-11187 | https://nvd.nist.gov/vuln/search |
| Cluster-md-kmp-default | CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 | https://nvd.nist.gov/vuln/search |
| Curl | CVE-2024-11053, CVE-2025-0167, CVE-2025-0725 | https://nvd.nist.gov/vuln/search |
| dlm-kmp-default | CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 | https://nvd.nist.gov/vuln/search |
| Emacs | CVE-2025-1244 | https://nvd.nist.gov/vuln/search |
| GLib2 | CVE-2025-0395 | https://nvd.nist.gov/vuln/search |
| grub2 | CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2024-56737, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125 | https://nvd.nist.gov/vuln/search |
| kernel-default | CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 | https://nvd.nist.gov/vuln/search |
| libbind9-160 | CVE-2009-0696, CVE-2009-4022, CVE-2010-3613, CVE-2010-3614, CVE-2010-3615, CVE-2011-0414, CVE-2011-1907, CVE-2011-1910, CVE-2011-2464, CVE-2011-4313, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244, CVE-2012-5166, CVE-2012-5688, CVE-2012-5689, CVE-2013-2266, CVE-2013-4854, CVE-2014-0591, CVE-2014-8500, CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-8000, CVE-2015-8704, CVE-2016-1285, CVE-2016-1286, CVE-2016-2775, CVE-2016-2776, CVE-2016-6170, CVE-2016-8864, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3142, CVE-2017-3143, CVE-2017-3145, CVE-2018-5740, CVE-2018-5743, CVE-2018-5745, CVE-2019-6465, CVE-2019-6471, CVE-2020-8616, CVE-2020-8617, CVE-2024-11187 | https://nvd.nist.gov/vuln/search |
| libfreetype6 | CVE-2025-27363 | https://nvd.nist.gov/vuln/search |
| libopenssl1_1 | CVE-2024-13176 | https://nvd.nist.gov/vuln/search |
| libtasn1 | CVE-2024-12133 | https://nvd.nist.gov/vuln/search |
| libX11 | CVE-2025-26597 | https://nvd.nist.gov/vuln/search |
| libxml2 | CVE-2022-49043, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113 | https://nvd.nist.gov/vuln/search |
| Openssh8.4 | CVE-2025-26465 | https://nvd.nist.gov/vuln/search |
| Oracle JRE 8u441 | CVE-2025-0509 | https://nvd.nist.gov/vuln/search |
| Rsync | CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 | https://nvd.nist.gov/vuln/search |
| Postgresql14 | CVE-2025-1094 | https://nvd.nist.gov/vuln/search |
| Intel | CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355 | https://nvd.nist.gov/vuln/search |
Betroffene Produkte und Korrektur
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| Dell Avamar Data Store Gen4T (Single Node) | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Data Store Gen5A | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Virtual Edition | SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Network Data Management Protocol (NDMP) Accelerator | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar VMware Image Backup Proxy | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Networker Virtual Edition (NVE) | SUSE Linux Enterprise 12 SP5 | Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 | Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 | NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1 |
| Dell PowerProtect DP Series Appliance (IDPA) | SUSE Linux Enterprise 12 SP5 | Versions prior to 2.7.8 | Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
| Dell Avamar Data Store Gen4T (Single Node) | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Data Store Gen5A | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Virtual Edition | SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar Network Data Management Protocol (NDMP) Accelerator | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Avamar VMware Image Backup Proxy | SUSE Linux Enterprise 12 SP5 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 | Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
| Dell Networker Virtual Edition (NVE) | SUSE Linux Enterprise 12 SP5 | Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 | Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 | NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1 |
| Dell PowerProtect DP Series Appliance (IDPA) | SUSE Linux Enterprise 12 SP5 | Versions prior to 2.7.8 | Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 | Avamar Proxy Bundle 2025-R1 |
Notes:
- The CVEs remedied in this security update are detailed in the Release Notes, which cover both the vulnerabilities addressed in this update and past vulnerabilities included in this cumulative update.
- Dell PowerProtect DP Series Appliance (IDPA) customers must upgrade to Version 2.7.8 available under Dell PowerProtect DP Series Appliance (IDPA), before applying the 2025-R1 security patches available under Avamar Proxy Bundle 2025-R1.
- For guidance on downloading and installing the latest Avamar Security Roll-up on Avamar Virtual Edition (AVE) systems using the EMC Avamar Installation Manager, refer to KB article 000169784: How to Install the Avamar Platform Security Rollup.
- To schedule a platform security patch installation or server upgrade, please contact Dell Customer Support.
- Additional product updates/releases are available in the Downloads section of their respective product pages. Dell recommends upgrading to the latest release/version of your product.
Known Issue:
- Installation of 2025 R1 Operating System (OS) Security Rollup on Dell Avamar Data Store Gen4T (Multi-Node) is not recommended due to a known issue with GNU GRand Unified Bootloader (GRUB2) as detailed in the following KB Article.
Workarounds und Korrekturmaßnahmen
None
Revisionsverlauf
| Revision | Date | Description |
| 1.0 | 2025-05-30 | Initial Release |
| 2.0 | 2025-06-20 | Minor update to reflect GRUB2 corruption in Avamar Data Store Gen4T (Multi-Node) |
| 3.0 | 2025-07-31 | Minor formatting updates; No content changes |
Zugehörige Informationen
Rechtlicher Hinweis
Betroffene Produkte
Avamar, PowerProtect Data Protection Appliance, PowerProtect Data Manager Appliance, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance SoftwareArtikeleigenschaften
Artikelnummer: 000326299
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 31 Juli 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.