DSA-2024-348: Security update for Dell Avamar, NetWorker Virtual Edition and PowerProtect DP Series Appliance / Dell IDPA Security Update for Multiple Vulnerabilities
Summary: Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance /Integrated Data Protection Appliance (IDPA) remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVEs | More Information |
|---|---|---|
| Oracle JRE 8u411 | CVE-2023-41993, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21085, CVE-2024-21094 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| kernel-default |
CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42445, CVE-2023-4244, CVE-2023-42755, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52527, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52586, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26625, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26828, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26874, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26948, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26993, CVE-2024-26996, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Apache2-prefork & Apache2-utils | CVE-2023-38709, CVE-2024-24795, CVE-2024-27316 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Apache2-mod_jk | CVE-2018-1323, CVE-2023-41081 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Bind-utils | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Cups | CVE-2024-35235 | https://nvd.nist.gov/vuln/detail/CVE-2024-35235 |
| Curl | CVE-2024-2004, CVE-2024-2398 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Emacs | CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Gdk-pixbuf-lang | CVE-2022-48622 | https://nvd.nist.gov/vuln/detail/CVE-2022-48622 |
| Artifex Ghostscript | CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| GLib2 |
CVE-2024-34397 | https://nvd.nist.gov/vuln/detail/CVE-2024-34397 |
| Glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| Krb5 | CVE-2021-37750, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| less | CVE-2022-48624, CVE-2024-32487 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libarchive13 | CVE-2024-20696 | https://nvd.nist.gov/vuln/detail/CVE-2024-20696 |
| libavahi | CVE-2023-38470, CVE-2023-38472 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| libcares2 | CVE-2024-25629 | https://nvd.nist.gov/vuln/detail/CVE-2024-25629 |
| libfastjson4 | CVE-2020-12762 | https://nvd.nist.gov/vuln/detail/CVE-2020-12762 |
| libjasper1 | CVE-2024-31744 | https://nvd.nist.gov/vuln/detail/CVE-2024-31744 |
| libnghttp2-14 | CVE-2024-28182 | https://nvd.nist.gov/vuln/detail/CVE-2024-28182 |
| libopenssl1_0_0 | CVE-2024-0727 | https://nvd.nist.gov/vuln/detail/CVE-2024-0727 |
| libopenssl1_1 | CVE-2024-4741 | https://nvd.nist.gov/vuln/detail/CVE-2024-4741 |
| libtiff5 |
CVE-2023-3164 | https://nvd.nist.gov/vuln/detail/CVE-2023-3164 |
| libxml2-2 |
CVE-2024-34459 | https://nvd.nist.gov/vuln/detail/CVE-2024-34459 |
| libvirt-libs | CVE-2024-2494 | https://nvd.nist.gov/vuln/detail/CVE-2024-2494 |
| libzypp | CVE-2017-9271 |
https://nvd.nist.gov/vuln/detail/CVE-2017-9271 |
| Opensc | CVE-2023-5992 | https://nvd.nist.gov/vuln/detail/CVE-2023-5992 |
| Postfix | CVE-2023-51764 |
https://nvd.nist.gov/vuln/detail/CVE-2023-51764 |
| postgresql14 | CVE-2024-4317 | https://nvd.nist.gov/vuln/detail/CVE-2024-4317 |
| python | CVE-2022-48560, CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| python3 | CVE-2022-48566, CVE-2023-6597, CVE-2024-0397, CVE-2024-4032 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| python-requests | CVE-2024-35195 | https://nvd.nist.gov/vuln/detail/CVE-2024-35195 |
| sssd | CVE-2023-3758 | https://nvd.nist.gov/vuln/detail/CVE-2023-3758 |
| terminfo | CVE-2023-45918 | https://nvd.nist.gov/vuln/detail/CVE-2023-45918 |
| util-linux | CVE-2024-28085 | https://nvd.nist.gov/vuln/detail/CVE-2024-28085 |
| ucode-intel | CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
| wget | CVE-2024-38428 | https://nvd.nist.gov/vuln/detail/CVE-2024-38428 |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
| Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
| Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Product | Affected Versions | Remediated Versions | Link |
|---|---|---|---|
| Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
| Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
| Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
| Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
- The CVEs remedied by this security update are listed in the Release Notes. The Release Notes list not only the new CVEs remedied by this update, but all the past CVEs included in this cumulative update.
- For Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Customers, Upgrade to PowerProtect DP 2.7.6 is strongly recommended prior to applying additional security patches. The patches can also be applied to the Appliances running PowerProtect DP 2.7.2 (all models) and PowerProtect DP 2.7.4 (DP4400 model only).
- Dell recommends that you always upgrade to the latest release/version for your product.
- To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home/product-support/product/avamar/drivers
Revision History
| Revision | Date | Description |
| 1.0 | 2024-08-06 | Initial Release |
Related Information
Legal Disclaimer
Affected Products
Avamar, NetWorker Family, PowerProtect Data Protection Appliance, Avamar, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, Avamar Server, Avamar Virtual Edition, PowerProtect Data Protection Software
, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software, NetWorker, NetWorker Series, NetWorker Module, Product Security Information
...
Article Properties
Article Number: 000227573
Article Type: Dell Security Advisory
Last Modified: 06 Nov 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.