Hopp til hovedinnhold
  • Legg inn bestillinger raskt og enkelt
  • Vis bestillinger og spor forsendelsesstatus
  • Opprett og få tilgang til en liste over produktene dine

DSA-2024-348 : Security update for Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Security Update for Multiple Vulnerabilities

Sammendrag: Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance /Integrated Data Protection Appliance (IDPA) remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system. ...

Denne artikkelen gjelder for   Denne artikkelen gjelder ikke for 

Påvirkning

Critical

Detaljer

Third-party Component CVEs More Information
Oracle JRE 8u411 CVE-2023-41993, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21085, CVE-2024-21094 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies., cpuapr2024This hyperlink is taking you to a website outside of Dell Technologies.
kernel-default
 
CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42445, CVE-2023-4244, CVE-2023-42755, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52527, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52586, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26625, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26828, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26874, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26948, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26993, CVE-2024-26996, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954,  See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. , SUSE-SU-2024:1648-1This hyperlink is taking you to a website outside of Dell Technologies.
Apache2-prefork & Apache2-utils CVE-2023-38709, CVE-2024-24795, CVE-2024-27316 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Apache2-mod_jk CVE-2018-1323, CVE-2023-41081 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Bind-utils CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Cups CVE-2024-35235 https://nvd.nist.gov/vuln/detail/CVE-2024-35235This hyperlink is taking you to a website outside of Dell Technologies.
Curl CVE-2024-2004, CVE-2024-2398 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Emacs CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Gdk-pixbuf-lang CVE-2022-48622 https://nvd.nist.gov/vuln/detail/CVE-2022-48622This hyperlink is taking you to a website outside of Dell Technologies.
Artifex Ghostscript CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
GLib2
 
CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397This hyperlink is taking you to a website outside of Dell Technologies.
Glibc CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Krb5 CVE-2021-37750, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
less CVE-2022-48624, CVE-2024-32487 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
libarchive13 CVE-2024-20696 https://nvd.nist.gov/vuln/detail/CVE-2024-20696This hyperlink is taking you to a website outside of Dell Technologies.
libavahi CVE-2023-38470, CVE-2023-38472 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
libcares2 CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629This hyperlink is taking you to a website outside of Dell Technologies.
libfastjson4 CVE-2020-12762 https://nvd.nist.gov/vuln/detail/CVE-2020-12762This hyperlink is taking you to a website outside of Dell Technologies.
libjasper1 CVE-2024-31744 https://nvd.nist.gov/vuln/detail/CVE-2024-31744This hyperlink is taking you to a website outside of Dell Technologies.
libnghttp2-14 CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182This hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_0_0 CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727This hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_1 CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741This hyperlink is taking you to a website outside of Dell Technologies.
libtiff5
 
CVE-2023-3164 https://nvd.nist.gov/vuln/detail/CVE-2023-3164This hyperlink is taking you to a website outside of Dell Technologies.
libxml2-2
 
CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459This hyperlink is taking you to a website outside of Dell Technologies.
libvirt-libs CVE-2024-2494 https://nvd.nist.gov/vuln/detail/CVE-2024-2494This hyperlink is taking you to a website outside of Dell Technologies.
libzypp CVE-2017-9271
 
https://nvd.nist.gov/vuln/detail/CVE-2017-9271This hyperlink is taking you to a website outside of Dell Technologies.
Opensc CVE-2023-5992 https://nvd.nist.gov/vuln/detail/CVE-2023-5992This hyperlink is taking you to a website outside of Dell Technologies.
Postfix CVE-2023-51764
 
https://nvd.nist.gov/vuln/detail/CVE-2023-51764This hyperlink is taking you to a website outside of Dell Technologies.
postgresql14 CVE-2024-4317 https://nvd.nist.gov/vuln/detail/CVE-2024-4317This hyperlink is taking you to a website outside of Dell Technologies.
python CVE-2022-48560, CVE-2023-52425, CVE-2024-0450 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
python3 CVE-2022-48566, CVE-2023-6597, CVE-2024-0397, CVE-2024-4032 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
python-requests CVE-2024-35195 https://nvd.nist.gov/vuln/detail/CVE-2024-35195This hyperlink is taking you to a website outside of Dell Technologies.
sssd CVE-2023-3758 https://nvd.nist.gov/vuln/detail/CVE-2023-3758This hyperlink is taking you to a website outside of Dell Technologies.
terminfo CVE-2023-45918 https://nvd.nist.gov/vuln/detail/CVE-2023-45918This hyperlink is taking you to a website outside of Dell Technologies.
util-linux CVE-2024-28085 https://nvd.nist.gov/vuln/detail/CVE-2024-28085This hyperlink is taking you to a website outside of Dell Technologies.
ucode-intel CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
wget CVE-2024-38428 https://nvd.nist.gov/vuln/detail/CVE-2024-38428This hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies anbefaler at alle kunder tar hensyn til både grunnpoengsummen og alle relevante, midlertidige og miljømessige resultater som kan påvirke den potensielle alvorlighetsgraden knyttet til bestemte sikkerhetsproblemer.

Berørte produkter og utbedring

Product Affected Versions Remediated Versions Link
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar Virtual Edition Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar NDMP Accelerator Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar VMware Image Proxy  Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz
Dell Networker Virtual Edition (NVE) Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Version 2.7.x running on SLES12SP5 Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Product Affected Versions Remediated Versions Link
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar Virtual Edition Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar NDMP Accelerator Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar VMware Image Proxy  Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz
Dell Networker Virtual Edition (NVE) Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Version 2.7.x running on SLES12SP5 Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
  • The CVEs remedied by this security update are listed in the Release Notes.  The Release Notes list not only the new CVEs remedied by this update, but all the past CVEs included in this cumulative update.
  • For Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Customers, Upgrade to PowerProtect DP 2.7.6 is strongly recommended prior to applying additional security patches. The patches can also be applied to the Appliances running PowerProtect DP 2.7.2 (all models) and PowerProtect DP 2.7.4 (DP4400 model only).
  • Dell recommends that you always upgrade to the latest release/version for your product.
  • To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home/product-support/product/avamar/drivers

Endringshistorikk

Revision DateDescription
1.02024-08-06Initial Release

Relatert informasjon

Berørte produkter

Avamar, NetWorker Family, PowerProtect Data Protection Appliance, Avamar, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, Avamar Server, Avamar Virtual Edition, PowerProtect Data Protection Software , Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software, NetWorker, NetWorker Series, NetWorker Module, Product Security Information ...
Artikkelegenskaper
Artikkelnummer: 000227573
Artikkeltype: Dell Security Advisory
Sist endret: 06 aug. 2024
Få svar på spørsmålene dine fra andre Dell-brukere
Støttetjenester
Sjekk om enheten din er dekket av støttetjenestene.