DSA-2024-378: Security Update for Dell Cloud Tiering Appliance for Multiple Third-Party Vulnerabilities.
Samenvatting: Dell Cloud Tiering Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Dit artikel is van toepassing op
Dit artikel is niet van toepassing op
Dit artikel is niet gebonden aan een specifiek product.
Niet alle productversies worden in dit artikel vermeld.
Impact
High
Gegevens
| Third-party Component | CVEs | More Information |
|---|---|---|
| Kernel-default | CVE-2021-46955, CVE-2021-47041, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47184, CVE-2021-47185, CVE-2021-47194, CVE-2021-47198, CVE-2021-47201, CVE-2021-47203, CVE-2021-47206, CVE-2021-47207, CVE-2021-47212, CVE-2022-48631, CVE-2022-48651, CVE-2022-48654, CVE-2022-48687, CVE-2023-2860, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-26688, CVE-2024-26689, CVE-2024-26733, CVE-2024-26739, CVE-2024-26744CVE-2024-26816, CVE-2024-26840, CVE-2024-26852, CVE-2024-26862, CVE-2024-26898, CVE-2024-26903, CVE-2024-26906, CVE-2024-27043, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47236, CVE-2021-47239, CVE-2021-47240, CVE-2021-47246, CVE-2021-47252, CVE-2021-47254, CVE-2021-47255, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47338, CVE-2021-47341, CVE-2021-47344, CVE-2021-47347, CVE-2021-47350, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47431, CVE-2021-47434, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47445, CVE-2021-47456, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47505, CVE-2021-47506, CVE-2021-47511, CVE-2021-47516, CVE-2021-47522, CVE-2021-47527, CVE-2021-47538, CVE-2021-47541, CVE-2021-47542, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-20132, CVE-2022-48673, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914, CVE-2020-10135, CVE-2021-3896, CVE-2021-43389, CVE-2021-4439, CVE-2021-47247, CVE-2021-47311, CVE-2021-47328, CVE-2021-47368, CVE-2021-47372, CVE-2021-47379, CVE-2021-47571, CVE-2021-47583, CVE-2022-0435, CVE-2022-22942, CVE-2022-2938, CVE-2022-48711, CVE-2022-48760, CVE-2022-48771, CVE-2023-24023, CVE-2023-52707, CVE-2023-52752, CVE-2023-52881, CVE-2024-26921, CVE-2024-26923, CVE-2024-35789, CVE-2024-35861, CVE-2024-35862, CVE-2024-35864, CVE-2024-35878, CVE-2024-35950, CVE-2024-36894, CVE-2024-36904, CVE-2024-36940, CVE-2024-36964, CVE-2024-38541, CVE-2024-38545, CVE-2024-38559, CVE-2024-38560 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libxml2 | CVE-2024-25062 | https://nvd.nist.gov/vuln/detail/CVE-2024-25062 |
| perl | CVE-2017-6512, CVE-2018-6798, CVE-2018-6913, CVE-2023-31484 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| openssl-1_1 | CVE-2024-251, CVE-2024-4741 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python3 | CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libfastjson | CVE-2020-12762 | https://nvd.nist.gov/vuln/detail/CVE-2020-12762 |
| glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| cups | CVE-2024-35235 | https://nvd.nist.gov/vuln/detail/CVE-2024-35235 |
| bind | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517, CVE-2023-6516, CVE-2024-1737, CVE-2024-1975 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| krb5 | CVE-2024-37370, CVE-2024-37371 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| xen | CVE-2023-28746, CVE-2023-46842, CVE-2024-2193, CVE-2024-2201, CVE-2024-31142, CVE-2024-31143 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| mozilla-nss | CVE-2023-5388 | https://nvd.nist.gov/vuln/detail/CVE-2023-5388 |
| java-11-openjdk | CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| skopeo | CVE-2024-28180 | https://nvd.nist.gov/vuln/detail/CVE-2024-28180 |
Getroffen producten en herstel
| Product | Software/Firmware | Affected Versions | Updated Version | Link |
|---|---|---|---|---|
| Cloud Tiering Appliance | CTA and CTA-HA | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/ product-support/product/cloud-tiering-appliance/drivers |
| Cloud Tiering Appliance | CTA/VE and CTA-HA/VE | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/product-support/product/cloud-tiering-applianceve/drivers |
| Product | Software/Firmware | Affected Versions | Updated Version | Link |
|---|---|---|---|---|
| Cloud Tiering Appliance | CTA and CTA-HA | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/ product-support/product/cloud-tiering-appliance/drivers |
| Cloud Tiering Appliance | CTA/VE and CTA-HA/VE | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/product-support/product/cloud-tiering-applianceve/drivers |
Revisiegeschiedenis
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-09-02 | Initial Release |
| 2.0 | 2024-10-25 | Updated for enhanced presentation with no changes to content. |
Verwante informatie
Juridische verklaring van afstand
Getroffen producten
Cloud Tiering Appliance, Cloud Tiering Appliance, Cloud Tiering Appliance Platform, Cloud Tiering Appliance/VEArtikeleigenschappen
Artikelnummer: 000228228
Artikeltype: Dell Security Advisory
Laatst aangepast: 09 sep. 2025
Vind antwoorden op uw vragen via andere Dell gebruikers
Support Services
Controleer of uw apparaat wordt gedekt door Support Services.