Critical
Third-party Component | CVEs | More Information |
---|---|---|
Oracle JRE 8u411 | CVE-2023-41993, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21085, CVE-2024-21094 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/, cpuapr2024 |
kernel-default |
CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42445, CVE-2023-4244, CVE-2023-42755, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52527, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52586, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26625, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26828, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26874, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26948, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26993, CVE-2024-26996, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954, | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ , SUSE-SU-2024:1648-1 |
Apache2-prefork & Apache2-utils | CVE-2023-38709, CVE-2024-24795, CVE-2024-27316 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Apache2-mod_jk | CVE-2018-1323, CVE-2023-41081 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Bind-utils | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Cups | CVE-2024-35235 | https://nvd.nist.gov/vuln/detail/CVE-2024-35235 |
Curl | CVE-2024-2004, CVE-2024-2398 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Emacs | CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Gdk-pixbuf-lang | CVE-2022-48622 | https://nvd.nist.gov/vuln/detail/CVE-2022-48622 |
Artifex Ghostscript | CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
GLib2 |
CVE-2024-34397 | https://nvd.nist.gov/vuln/detail/CVE-2024-34397 |
Glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
Krb5 | CVE-2021-37750, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
less | CVE-2022-48624, CVE-2024-32487 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libarchive13 | CVE-2024-20696 | https://nvd.nist.gov/vuln/detail/CVE-2024-20696 |
libavahi | CVE-2023-38470, CVE-2023-38472 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
libcares2 | CVE-2024-25629 | https://nvd.nist.gov/vuln/detail/CVE-2024-25629 |
libfastjson4 | CVE-2020-12762 | https://nvd.nist.gov/vuln/detail/CVE-2020-12762 |
libjasper1 | CVE-2024-31744 | https://nvd.nist.gov/vuln/detail/CVE-2024-31744 |
libnghttp2-14 | CVE-2024-28182 | https://nvd.nist.gov/vuln/detail/CVE-2024-28182 |
libopenssl1_0_0 | CVE-2024-0727 | https://nvd.nist.gov/vuln/detail/CVE-2024-0727 |
libopenssl1_1 | CVE-2024-4741 | https://nvd.nist.gov/vuln/detail/CVE-2024-4741 |
libtiff5 |
CVE-2023-3164 | https://nvd.nist.gov/vuln/detail/CVE-2023-3164 |
libxml2-2 |
CVE-2024-34459 | https://nvd.nist.gov/vuln/detail/CVE-2024-34459 |
libvirt-libs | CVE-2024-2494 | https://nvd.nist.gov/vuln/detail/CVE-2024-2494 |
libzypp | CVE-2017-9271 |
https://nvd.nist.gov/vuln/detail/CVE-2017-9271 |
Opensc | CVE-2023-5992 | https://nvd.nist.gov/vuln/detail/CVE-2023-5992 |
Postfix | CVE-2023-51764 |
https://nvd.nist.gov/vuln/detail/CVE-2023-51764 |
postgresql14 | CVE-2024-4317 | https://nvd.nist.gov/vuln/detail/CVE-2024-4317 |
python | CVE-2022-48560, CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
python3 | CVE-2022-48566, CVE-2023-6597, CVE-2024-0397, CVE-2024-4032 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
python-requests | CVE-2024-35195 | https://nvd.nist.gov/vuln/detail/CVE-2024-35195 |
sssd | CVE-2023-3758 | https://nvd.nist.gov/vuln/detail/CVE-2023-3758 |
terminfo | CVE-2023-45918 | https://nvd.nist.gov/vuln/detail/CVE-2023-45918 |
util-linux | CVE-2024-28085 | https://nvd.nist.gov/vuln/detail/CVE-2024-28085 |
ucode-intel | CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 | See NVD link below for individual scores for each CVE. https://nvd.nist.gov/ |
wget | CVE-2024-38428 | https://nvd.nist.gov/vuln/detail/CVE-2024-38428 |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Product | Affected Versions | Remediated Versions | Link |
---|---|---|---|
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar Virtual Edition | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar NDMP Accelerator | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Dell Avamar VMware Image Proxy | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz |
Dell Networker Virtual Edition (NVE) | Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 | Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 | https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp |
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) | Version 2.7.x running on SLES12SP5 | Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 | https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp |
Revision | Date | Description |
1.0 | 2024-08-06 | Initial Release |