DSA-2025-213: Security update for Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Multiple Third-Party Vulnerabilities

概要: Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) remediation is available for multiple multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system. ...

この記事は次に適用されます: この記事は次には適用されません: この記事は、特定の製品に関連付けられていません。 すべての製品パージョンがこの記事に記載されているわけではありません。

影響

Critical

詳細

Third-party Component CVEs More Information
Bind-utils CVE-2024-11187 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Cluster-md-kmp-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Curl CVE-2024-11053, CVE-2025-0167, CVE-2025-0725 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
dlm-kmp-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Emacs CVE-2025-1244 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
GLib2 CVE-2025-0395 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
grub2 CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2024-56737, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
kernel-default CVE-2021-47222, CVE-2021-47223, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48664, CVE-2022-48742, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49033, CVE-2022-49035, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52434, CVE-2023-52572, CVE-2023-52853, CVE-2023-52922, CVE-2023-52924, CVE-2024-26644, CVE-2024-26810, CVE-2024-26976, CVE-2024-27397, CVE-2024-35847, CVE-2024-36484, CVE-2024-36883, CVE-2024-38589, CVE-2024-41013, CVE-2024-47141, CVE-2024-47666, CVE-2024-47678, CVE-2024-47709, CVE-2024-47809, CVE-2024-48881, CVE-2024-49867, CVE-2024-49944, CVE-2024-49948, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50039, CVE-2024-50067, CVE-2024-50142, CVE-2024-50143, CVE-2024-50151, CVE-2024-50166, CVE-2024-50199, CVE-2024-50211, CVE-2024-50251, CVE-2024-50256, CVE-2024-50262, CVE-2024-50280, CVE-2024-50287, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53057, CVE-2024-53101, CVE-2024-53112, CVE-2024-53136, CVE-2024-53141, CVE-2024-53144, CVE-2024-53146, CVE-2024-53150, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53179, CVE-2024-53185, CVE-2024-53197, CVE-2024-53198, CVE-2024-53210, CVE-2024-53214, CVE-2024-53217, CVE-2024-53224, CVE-2024-53227, CVE-2024-53239, CVE-2024-53240, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56548, CVE-2024-56551, CVE-2024-56569, CVE-2024-56570, CVE-2024-56574, CVE-2024-56587, CVE-2024-56593, CVE-2024-56594, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-5660, CVE-2024-56615, CVE-2024-56616, CVE-2024-56623, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56647, CVE-2024-56650, CVE-2024-56658, CVE-2024-56661, CVE-2024-56662, CVE-2024-56664, CVE-2024-56681, CVE-2024-56688, CVE-2024-56700, CVE-2024-56704, CVE-2024-56722, CVE-2024-56724, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56769, CVE-2024-57791, CVE-2024-57849, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57899, CVE-2024-57903, CVE-2024-57922, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57938, CVE-2024-8805, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21653, CVE-2025-21664, CVE-2025-21673, CVE-2025-21678, CVE-2025-21682, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libbind9-160 CVE-2009-0696, CVE-2009-4022, CVE-2010-3613, CVE-2010-3614, CVE-2010-3615, CVE-2011-0414, CVE-2011-1907, CVE-2011-1910, CVE-2011-2464, CVE-2011-4313, CVE-2012-1667, CVE-2012-3817, CVE-2012-3868, CVE-2012-4244, CVE-2012-5166, CVE-2012-5688, CVE-2012-5689, CVE-2013-2266, CVE-2013-4854, CVE-2014-0591, CVE-2014-8500, CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-8000, CVE-2015-8704, CVE-2016-1285, CVE-2016-1286, CVE-2016-2775, CVE-2016-2776, CVE-2016-6170, CVE-2016-8864, CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-3135, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2017-3142, CVE-2017-3143, CVE-2017-3145, CVE-2018-5740, CVE-2018-5743, CVE-2018-5745, CVE-2019-6465, CVE-2019-6471, CVE-2020-8616, CVE-2020-8617, CVE-2024-11187 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libfreetype6 CVE-2025-27363 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_1 CVE-2024-13176 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libtasn1 CVE-2024-12133 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libX11 CVE-2025-26597 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
libxml2 CVE-2022-49043, CVE-2024-56171, CVE-2025-24928, CVE-2025-27113 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Openssh8.4 CVE-2025-26465 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Oracle JRE 8u441 CVE-2025-0509 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Rsync CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Postgresql14 CVE-2025-1094 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.
Intel CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355 https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

デル・テクノロジーズでは、すべてのお客様に対して、CVSSベース スコアに加えて、特定のセキュリティの脆弱性に付随する潜在的な重要度に影響する可能性のある現状スコアや環境スコアも考慮することをお勧めしています。

影響を受ける製品と修復

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Avamar Data Store Gen4T (Single Node) SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Data Store Gen5A SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Virtual Edition SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Network Data Management Protocol (NDMP) Accelerator SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar VMware Image Backup Proxy SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Networker Virtual Edition (NVE) SUSE Linux Enterprise 12 SP5 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1
Dell PowerProtect DP Series Appliance (IDPA) SUSE Linux Enterprise 12 SP5 Versions prior to 2.7.8 Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1

 

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Avamar Data Store Gen4T (Single Node) SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Data Store Gen5A SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Virtual Edition SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar Network Data Management Protocol (NDMP) Accelerator SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Avamar VMware Image Backup Proxy SUSE Linux Enterprise 12 SP5 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 Versions 19.10, 19.10-SP1, 19.12, 19.7, 19.8, and 19.9 with the latest OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1
Dell Networker Virtual Edition (NVE) SUSE Linux Enterprise 12 SP5 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 Versions 19.5, 19.6, 19.7, 19.8, 19.9, 19.10, 19.11, 19.12 with the latest OS Security Rollup 2025R1 NetWorker Virtual Edition (NVE) Platform Security Rollup 2025-R1
Dell PowerProtect DP Series Appliance (IDPA) SUSE Linux Enterprise 12 SP5 Versions prior to 2.7.8 Version 2.7.8 with latest AV Platform OS Security Rollup 2025R1 Avamar Proxy Bundle 2025-R1

 

Notes:

  1. The CVEs remedied in this security update are detailed in the Release Notes, which cover both the vulnerabilities addressed in this update and past vulnerabilities included in this cumulative update.
  2. Dell PowerProtect DP Series Appliance (IDPA) customers must upgrade to Version 2.7.8 available under Dell PowerProtect DP Series Appliance (IDPA), before applying the 2025-R1 security patches available under Avamar Proxy Bundle 2025-R1.
  3. For guidance on downloading and installing the latest Avamar Security Roll-up on Avamar Virtual Edition (AVE) systems using the EMC Avamar Installation Manager, refer to KB article 000169784: How to Install the Avamar Platform Security Rollup.
  4. To schedule a platform security patch installation or server upgrade, please contact Dell Customer Support.
  5. Additional product updates/releases are available in the Downloads section of their respective product pages. Dell recommends upgrading to the latest release/version of your product.

Known Issue:

  • Installation of 2025 R1 Operating System (OS) Security Rollup on Dell Avamar Data Store Gen4T (Multi-Node) is not recommended due to a known issue with GNU GRand Unified Bootloader (GRUB2) as detailed in the following KB Article.

回避策と緩和策

None

変更履歴

RevisionDateDescription
1.02025-05-30Initial Release
2.02025-06-20Minor update to reflect GRUB2 corruption in Avamar Data Store Gen4T (Multi-Node)
3.02025-07-31Minor formatting updates; No content changes

 

関連情報

対象製品

Avamar, PowerProtect Data Protection Appliance, PowerProtect Data Manager Appliance, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
文書のプロパティ
文書番号: 000326299
文書の種類: Dell Security Advisory
最終更新: 31 7月 2025
質問に対する他のDellユーザーからの回答を見つける
サポート サービス
お使いのデバイスがサポート サービスの対象かどうかを確認してください。