DSA-2024-031: Security Update for Dell Data Protection Search for Multiple Third-Party Component Vulnerabilities
Summary: Dell Data Protection Search remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| Oracle JRE | CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| vim | CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| openssl | CVE-2022-2068, CVE-2022-1292 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Kernel-default | CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| SSH Terrapin | CVE-2023-48795, CVE-2023-46445, CVE-2023-46446 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libxslt | CVE-2021-30560 | https://nvd.nist.gov/vuln/detail/CVE-2021-30560 |
| cifs-utils | CVE-2022-27239 | https://nvd.nist.gov/vuln/detail/CVE-2022-27239 |
| glibc | CVE-2022-23219, CVE-2022-23218 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| binutils | CVE-2021-45078, CVE-2022-2440 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| nss, mozilla | CVE-2021-43527 | https://nvd.nist.gov/vuln/detail/CVE-2021-43527 |
| rsyslog | CVE-2022-24903 | https://nvd.nist.gov/vuln/detail/CVE-2022-24903 |
| e2fsprogs | CVE-2022-1304 | https://nvd.nist.gov/vuln/detail/cve-2022-1304 |
| augeas | CVE-2017-7555 | https://nvd.nist.gov/vuln/detail/CVE-2017-7555 |
| cyrus SASL | CVE-2022-24407 | https://nvd.nist.gov/vuln/detail/CVE-2022-24407 |
| grub2 | CVE-2022-3696 | https://nvd.nist.gov/vuln/detail/CVE-2022-3696 |
| open-vm-tools | CVE-2023-0286 | https://nvd.nist.gov/vuln/detail/CVE-2023-0286 |
| curl | CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2023-46218, CVE-2023-46219 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| samba | CVE-2020-25717 | https://nvd.nist.gov/vuln/detail/CVE-2020-25717 |
| libtiff5 | CVE-2020-35524, CVE-2020-35523 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libldpa | CVE-2022-29155 | https://nvd.nist.gov/vuln/detail/CVE-2022-29155 |
| libexif12 | CVE-2020-0452 | https://nvd.nist.gov/vuln/detail/CVE-2020-0452 |
| zlib | CVE-2023-45853 | https://nvd.nist.gov/vuln/detail/CVE-2021-45853 |
| ApacheLog4j | CVE-2021-44832 | https://nvd.nist.gov/vuln/detail/CVE-2021-44832 |
| LdapSettings.get_ldap_info | CVE-2024-22433 | https://nvd.nist.gov/vuln/detail/CVE-2024-22433 |
Affected Products & Remediation
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | Dell Data Protection Search | Versions 19.3.0, 19.4.0, 19.5.0, 19.5.1, 19.6.0, 19.6.1, 19.6.2, 19.6.3, and 19.6.4 | Version 19.6.5 or later | https://dl.dell.com/downloads/W7JCP_Search-19.6.5-upgrade-package.ova |
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | IDPA | Versions prior to 2.7.6 | Version 2.7.6 with DP Search 19.6.5 | https://dl.dell.com/downloads/3F82V_Search-19.6.5-upgrade-package.zip |
| CVEs Addressed | Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | Dell Data Protection Search | Versions 19.3.0, 19.4.0, 19.5.0, 19.5.1, 19.6.0, 19.6.1, 19.6.2, 19.6.3, and 19.6.4 | Version 19.6.5 or later | https://dl.dell.com/downloads/W7JCP_Search-19.6.5-upgrade-package.ova |
| CVE-2023-41993, CVE-2024-21892, CVE-2024-20954, CVE-2024-21098, CVE-2024-21085, CVE-2024-21011, CVE-2024-21068, CVE-2024-21094, CVE-2024-21003, CVE-2024-21005, CVE-2024-21002, CVE-2024-21004, CVE-2022-3491, CVE-2022-3520, CVE-2022-3591, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2024-22667, CVE-2022-1968, CVE-2022-0213, CVE-2021-4136, CVE-2022-2286, CVE-2022-2124, CVE-2022-0261, CVE-2022-2304, CVE-2022-2206, CVE-2022-1616, CVE-2022-0318, CVE-2021-4019, CVE-2021-3984, CVE-2022-0413, CVE-2021-3778, CVE-2021-3872, CVE-2022-2345, CVE-2022-2125, CVE-2022-0392, CVE-2022-2284, CVE-2022-2257, CVE-2022-1720, CVE-2022-0128, CVE-2022-2175, CVE-2022-2343, CVE-2022-2210, CVE-2022-2182, CVE-2022-2126, CVE-2022-1927, CVE-2022-2285, CVE-2021-3974, CVE-2022-0407, CVE-2022-2129, CVE-2021-3796, CVE-2022-1735, CVE-2021-3968, CVE-2022-1897, CVE-2022-1796, CVE-2022-0361, CVE-2022-1619, CVE-2021-4069, CVE-2022-1851, CVE-2022-0359, CVE-2021-3973, CVE-2021-3927, CVE-2022-2264, CVE-2022-1898, CVE-2022-2183, CVE-2022-1381, CVE-2022-2344, CVE-2022-2207, CVE-2021-4192, CVE-2022-2068, CVE-2022-1292, CVE-2024-26717, CVE-2023-7192, CVE-2022-1679, CVE-2022-20292, CVE-2022-0847, CVE-2022-0492, CVE-2022-1652, CVE-2021-4197, CVE-2022-1048, CVE-2021-4083, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446, CVE-2021-30560, CVE-2022-27239, CVE-2022-23219, CVE-2022-23218, CVE-2021-45078, CVE-2022-2440, CVE-2021-43527, CVE-2022-24903, CVE-2022-1304, CVE-2017-7555, CVE-2022-24407, CVE-2022-3696, CVE-2023-0286, CVE-2022-27774, CVE-2023-38545, CVE-2023-38546, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322, CVE-2020-25717, CVE-2020-35524, CVE-2020-35523, CVE-2022-29155, CVE-2020-0452, CVE-2023-45853, CVE-2021-44832, CVE-2023-22025, CVE-2023-22067, CVE-2023-22081, CVE-2023-46218, CVE-2023-46219 | IDPA | Versions prior to 2.7.6 | Version 2.7.6 with DP Search 19.6.5 | https://dl.dell.com/downloads/3F82V_Search-19.6.5-upgrade-package.zip |
- To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home
- IDPA 2.7.6 and prior versions are impacted. Fix will be available in the upcoming IDPA release.
- Dell advises that you consistently upgrade to the most recent release/version of your product.
Revision History
| Revision | Date | Description |
| 1.0 | 2024-07-15 | Initial Release |
| 2.0 | 2024-07-30 | Updated for enhanced format presentation with no change to content |
Related Information
Legal Disclaimer
Affected Products
Data Protection Search, PowerProtect Data Protection Appliance, Data Protection Search, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware
, Integrated Data Protection Appliance Software, Product Security Information
...
Article Properties
Article Number: 000226918
Article Type: Dell Security Advisory
Last Modified: 09 Sept 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.