DSA-2024-266: Security Update for Dell Data Protection Central for Multiple Security Vulnerabilities
Yhteenveto: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Tämä artikkeli koskee tuotetta
Tämä artikkeli ei koske tuotetta
Tämä artikkeli ei liity tiettyyn tuotteeseen.
Tässä artikkelissa ei yksilöidä kaikkia tuoteversioita.
Vaikutus
Critical
Tiedot
| Third-party Component | CVEs Addressed | More Information |
|---|---|---|
| SUSE Linux Enterprise Server 12 SP5 | CVE-2018-11490, CVE-2021-47078, CVE-2022-48627, CVE-2023-52530, CVE-2024-26622, CVE-2019-25160, CVE-2021-47100, CVE-2022-48636, CVE-2023-52531, CVE-2024-26642, CVE-2019-25162, CVE-2021-47101, CVE-2022-48650, CVE-2023-52532, CVE-2024-26651, CVE-2020-36312, CVE-2021-47104, CVE-2022-48651, CVE-2023-52574, CVE-2024-26671, CVE-2020-36777, CVE-2021-47110, CVE-2022-48667, CVE-2023-52575, CVE-2024-26675, CVE-2020-36784, CVE-2021-47112, CVE-2022-48668, CVE-2023-52583, CVE-2024-26689, CVE-2021-23134, CVE-2021-47114, CVE-2022-48688, CVE-2023-52587, CVE-2024-26704, CVE-2021-33200, CVE-2021-47117, CVE-2022-48695, CVE-2023-52591, CVE-2024-26733, CVE-2021-40633, CVE-2021-47118, CVE-2022-48701, CVE-2023-52595, CVE-2024-26743, CVE-2021-46904, CVE-2021-47119, CVE-2023-0160, CVE-2023-52597, CVE-2024-26744, CVE-2021-46905, CVE-2021-47138, CVE-2023-22655, CVE-2023-52598, CVE-2024-26747, CVE-2021-46906, CVE-2021-47141, CVE-2023-28746, CVE-2023-52605, CVE-2024-26763, CVE-2021-46907, CVE-2021-47142, CVE-2023-35827, CVE-2023-52607, CVE-2024-26771, CVE-2021-46909, CVE-2021-47143, CVE-2023-38575, CVE-2023-52614, CVE-2024-26772, CVE-2021-46915, CVE-2021-47146, CVE-2023-39368, CVE-2023-52620, CVE-2024-26773, CVE-2021-46921, CVE-2021-47149, CVE-2023-4244, CVE-2023-52635, CVE-2024-26777, CVE-2021-46924, CVE-2021-47150, CVE-2023-42445, CVE-2023-52639, CVE-2024-26778, CVE-2021-46932, CVE-2021-47153, CVE-2023-42465, CVE-2023-52644, CVE-2024-26779, CVE-2021-46938, CVE-2021-47161, CVE-2023-43490, CVE-2023-52646, CVE-2024-26793, CVE-2021-46939, CVE-2021-47162, CVE-2023-45918, CVE-2023-52650, CVE-2024-26805, CVE-2021-46941, CVE-2021-47165, CVE-2023-46343, CVE-2023-52652, CVE-2024-26816, CVE-2021-46950, CVE-2021-47166, CVE-2023-4750, CVE-2023-52653, CVE-2024-26817, CVE-2021-46953, CVE-2021-47167, CVE-2023-48231, CVE-2023-6270, CVE-2024-26839, CVE-2021-46958, CVE-2021-47168, CVE-2023-48232, CVE-2023-6597, CVE-2024-26840, CVE-2021-46960, CVE-2021-47169, CVE-2023-48233, CVE-2023-7042, CVE-2024-26852, CVE-2021-46963, CVE-2021-47171, CVE-2023-48234, CVE-2023-7192, CVE-2024-26855, CVE-2021-46964, CVE-2021-47173, CVE-2023-48235, CVE-2024-0607, CVE-2024-26857, CVE-2021-46966, CVE-2021-47177, CVE-2023-48236, CVE-2024-0727, CVE-2024-26859, CVE-2021-46975, CVE-2021-47179, CVE-2023-48237, CVE-2024-1151, CVE-2024-26878, CVE-2021-46981, CVE-2021-47180, CVE-2023-48706, CVE-2024-2004, CVE-2024-26883, CVE-2021-46988, CVE-2021-47181, CVE-2023-52340, CVE-2024-21011, CVE-2024-26884, CVE-2021-46990, CVE-2021-47182, CVE-2023-52429, CVE-2024-21012, CVE-2024-26901, CVE-2021-46991, CVE-2021-47183, CVE-2023-52443, CVE-2024-21068, CVE-2024-26907, CVE-2021-46992, CVE-2021-47184, CVE-2023-52445, CVE-2024-21085, CVE-2024-26922, CVE-2021-46998, CVE-2021-47185, CVE-2023-52449, CVE-2024-21094, CVE-2024-26929, CVE-2021-47006, CVE-2021-47188, CVE-2023-52451, CVE-2024-2201, CVE-2024-26930, CVE-2021-47013, CVE-2021-47189, CVE-2023-52464, CVE-2024-22099, CVE-2024-26931, CVE-2021-47015, CVE-2021-47198, CVE-2023-52469, CVE-2024-22667, CVE-2024-26948, CVE-2021-47024, CVE-2021-47202, CVE-2023-52470, CVE-2024-23307, CVE-2024-26993, CVE-2021-47034, CVE-2021-47203, CVE-2023-52474, CVE-2024-23848, CVE-2024-27013, CVE-2021-47045, CVE-2021-47204, CVE-2023-52475, CVE-2024-23849, CVE-2024-27014, CVE-2021-47049, CVE-2021-47205, CVE-2023-52476, CVE-2024-23851, CVE-2024-27043, CVE-2021-47054, CVE-2021-47207, CVE-2023-52477, CVE-2024-2398, CVE-2024-27046, CVE-2021-47055, CVE-2021-47211, CVE-2023-52478, CVE-2024-24855, CVE-2024-27054, CVE-2021-47056, CVE-2021-47216, CVE-2023-52482, CVE-2024-24861, CVE-2024-27072, CVE-2021-47063, CVE-2021-47217, CVE-2023-52486, CVE-2024-26458, CVE-2024-27073, CVE-2021-47070, CVE-2022-0487, CVE-2023-52488, CVE-2024-26461, CVE-2024-27074, CVE-2021-47071, CVE-2022-1996, CVE-2023-52502, CVE-2024-26585, CVE-2024-27075, CVE-2021-47073, CVE-2022-20154, CVE-2023-52515, CVE-2024-26595, CVE-2024-27078, CVE-2021-47076, CVE-2022-48619, CVE-2023-52524, CVE-2024-26600, CVE-2024-27388, CVE-2021-47077, CVE-2022-48624, CVE-2023-52528, CVE-2024-26614, CVE-2024-28085, CVE-2024-28182, CVE-2024-32487 |
https://www.suse.com/security/cve/ |
Tuotteet, joihin asia vaikuttaa, ja tilanteen korjaaminen
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
- Platform: SUSE Linux Enterprise Server 12 SP5
- (2)Versions 19.5 through 19.10.0-4 covers DPC version 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x.
- To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.19-1
To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.
See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs
The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.19-1
Versiohistoria
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-06-10 | Initial Release |
Asiaan liittyvät tiedot
Vastuuvapauslauseke
Tuotteet, joihin vaikutus kohdistuu
PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance SoftwareArtikkelin ominaisuudet
Artikkelin numero: 000225893
Artikkelin tyyppi: Dell Security Advisory
Viimeksi muutettu: 19 syysk. 2025
Etsi vastauksia kysymyksiisi muilta Dell-käyttäjiltä
Tukipalvelut
Tarkista, kuuluuko laitteesi tukipalveluiden piiriin.