DSA-2025-361: Security Update for Dell Data Protection Central Multiple Third Party Component Vulnerabilities

Sammendrag: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Denne artikkelen gjelder for Denne artikkelen gjelder ikke for Denne artikkelen er ikke knyttet til noe bestemt produkt. Det er ikke produktversjonene som identifiseres i denne artikkelen.

Påvirkning

Critical

Detaljer

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2006-7250, CVE-2009-2625, CVE-2011-4108, CVE-2013-0169, CVE-2015-3193, CVE-2016-0701, CVE-2016-10009, CVE-2016-5420, CVE-2017-14245, CVE-2017-14246, CVE-2017-17405, CVE-2017-17484, CVE-2017-17742, CVE-2017-7867, CVE-2017-8816, CVE-2018-10360 , CVE-2018-19638, CVE-2019-12450, CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387, CVE-2019-15167, CVE-2019-19880, CVE-2019-19921, CVE-2019-9636, CVE-2019-9947, CVE-2020-16599, CVE-2020-5260, CVE-2021-46984, CVE-2021-46987, CVE-2021-47212, CVE-2021-47455, CVE-2021-47527, CVE-2022-1292, CVE-2022-1679, CVE-2022-21546, CVE-2022-2586, CVE-2022-3903, CVE-2022-39253, CVE-2022-4095, CVE-2022-4129, CVE-2022-4662, CVE-2022-49138, CVE-2022-49154, CVE-2022-49319, CVE-2022-49323, CVE-2022-49622, CVE-2022-49731, CVE-2022-49764, CVE-2022-49768, CVE-2022-49780, CVE-2022-49814, CVE-2022-49825, CVE-2022-49879, CVE-2022-49881, CVE-2022-49917, CVE-2022-49921, CVE-2022-49934, CVE-2022-49938, CVE-2022-49948, CVE-2022-49954, CVE-2022-49957, CVE-2022-49967, CVE-2022-49969, CVE-2022-49975, CVE-2022-49977, CVE-2022-49978, CVE-2022-49980, CVE-2022-49981, CVE-2022-49986, CVE-2022-49987, CVE-2022-49990, CVE-2022-49993, CVE-2022-50007, CVE-2022-50008, CVE-2022-50012, CVE-2022-50020, CVE-2022-50022, CVE-2022-50025, CVE-2022-50027, CVE-2022-50030, CVE-2022-50033, CVE-2022-50045, CVE-2022-50055, CVE-2022-50065, CVE-2022-50066, CVE-2022-50073, CVE-2022-50080, CVE-2022-50082, CVE-2022-50083, CVE-2022-50084, CVE-2022-50085, CVE-2022-50087, CVE-2022-50091, CVE-2022-50092, CVE-2022-50093, CVE-2022-50094, CVE-2022-50097, CVE-2022-50098, CVE-2022-50099, CVE-2022-50101, CVE-2022-50102, CVE-2022-50103, CVE-2022-50104, CVE-2022-50109, CVE-2022-50116, CVE-2022-50126, CVE-2022-50127, CVE-2022-50134, CVE-2022-50138, CVE-2022-50141, CVE-2022-50146, CVE-2022-50149, CVE-2022-50152, CVE-2022-50153, CVE-2022-50159, CVE-2022-50162, CVE-2022-50173, CVE-2022-50181, CVE-2022-50185, CVE-2022-50191, CVE-2022-50200, CVE-2022-50206, CVE-2022-50211, CVE-2022-50215, CVE-2022-50220, CVE-2022-50226, CVE-2022-50228, CVE-2022-50229, CVE-2023-2176, CVE-2023-3111, CVE-2023-3817, CVE-2023-52500, CVE-2023-52813, CVE-2023-52878, CVE-2023-52927, CVE-2023-53020, CVE-2023-53063, CVE-2023-53081, CVE-2023-53090, CVE-2023-53091, CVE-2023-53117, CVE-2023-53118, CVE-2023-53133, CVE-2024-11168, CVE-2024-12718, CVE-2024-2236, CVE-2024-26586, CVE-2024-26825, CVE-2024-26872, CVE-2024-26875, CVE-2024-26974, CVE-2024-26982, CVE-2024-35790, CVE-2024-35839, CVE-2024-36959, CVE-2024-38588, CVE-2024-41965, CVE-2024-44963, CVE-2024-46713, CVE-2024-49861, CVE-2024-57982, CVE-2024-9287, CVE-2025-0495, CVE-2025-0938, CVE-2025-10148, CVE-2025-20053, CVE-2025-20109, CVE-2025-21731, CVE-2025-21898, CVE-2025-21920, CVE-2025-21928, CVE-2025-21971, CVE-2025-22022, CVE-2025-22035, CVE-2025-22247, CVE-2025-22839, CVE-2025-22840, CVE-2025-22872, CVE-2025-22889, CVE-2025-23141, CVE-2025-23149, CVE-2025-23163, CVE-2025-26403, CVE-2025-27613, CVE-2025-29087, CVE-2025-29088, CVE-2025-29768, CVE-2025-30749, CVE-2025-30754, CVE-2025-30761, CVE-2025-32086, CVE-2025-32414, CVE-2025-32415, CVE-2025-32462, CVE-2025-37756, CVE-2025-37757, CVE-2025-37781, CVE-2025-37800, CVE-2025-37810, CVE-2025-37836, CVE-2025-37844, CVE-2025-37856, CVE-2025-37862, CVE-2025-37885, CVE-2025-37892, CVE-2025-37911, CVE-2025-37920, CVE-2025-37923, CVE-2025-37927, CVE-2025-37928, CVE-2025-37961, CVE-2025-37980, CVE-2025-37982, CVE-2025-37992, CVE-2025-37995, CVE-2025-37998, CVE-2025-38000, CVE-2025-38004, CVE-2025-38023, CVE-2025-38024, CVE-2025-38034, CVE-2025-38035, CVE-2025-38040, CVE-2025-38051, CVE-2025-38058, CVE-2025-38061, CVE-2025-38064, CVE-2025-38068, CVE-2025-38072, CVE-2025-38074, CVE-2025-38075, CVE-2025-38078, CVE-2025-38079, CVE-2025-38083, CVE-2025-38094, CVE-2025-38102, CVE-2025-38103, CVE-2025-38105, CVE-2025-38108, CVE-2025-38112, CVE-2025-38115, CVE-2025-38117, CVE-2025-38122, CVE-2025-38126, CVE-2025-38147, CVE-2025-38153, CVE-2025-38157, CVE-2025-38161, CVE-2025-38166, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180, CVE-2025-38181, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38192, CVE-2025-38193, CVE-2025-38198, CVE-2025-38200, CVE-2025-38211, CVE-2025-38212, CVE-2025-38213, CVE-2025-38214, CVE-2025-38222, CVE-2025-38245, CVE-2025-38249, CVE-2025-38250, CVE-2025-38263, CVE-2025-38264, CVE-2025-38312, CVE-2025-38313, CVE-2025-38319, CVE-2025-38323, CVE-2025-38337, CVE-2025-38350, CVE-2025-38352, CVE-2025-38375, CVE-2025-38386, CVE-2025-38391, CVE-2025-38403, CVE-2025-38415, CVE-2025-38420, CVE-2025-38424, CVE-2025-38430, CVE-2025-38449, CVE-2025-38457, CVE-2025-38460, CVE-2025-38464, CVE-2025-38465, CVE-2025-38468, CVE-2025-38470, CVE-2025-38473, CVE-2025-38474, CVE-2025-38477, CVE-2025-38494, CVE-2025-38495, CVE-2025-38498, CVE-2025-38499, CVE-2025-38512, CVE-2025-38513, CVE-2025-38515, CVE-2025-38546, CVE-2025-38556, CVE-2025-38563, CVE-2025-38617, CVE-2025-38618, CVE-2025-38644, CVE-2025-4435, CVE-2025-4516, CVE-2025-4517, CVE-2025-46835, CVE-2025-48384, CVE-2025-4877, CVE-2025-4878, CVE-2025-49794, CVE-2025-49796, CVE-2025-50059, CVE-2025-50106, CVE-2025-5222, CVE-2025-5278, CVE-2025-5318, CVE-2025-5372, CVE-2025-54388, CVE-2025-6021, CVE-2025-6069, CVE-2025-6170, CVE-2025-6965, CVE-2025-7425, CVE-2025-9086 suse.comThis hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies anbefaler at alle kunder tar hensyn til både grunnpoengsummen og alle relevante, midlertidige og miljømessige resultater som kan påvirke den potensielle alvorlighetsgraden knyttet til bestemte sikkerhetsproblemer.

Berørte produkter og utbedring

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Versions 19.8 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 Versions 19.8 through 19.12(2) with Data Protection Central OS Update dpc-osupdate-1.1.24-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) Data Protection Central OS Update for Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 Version 2.7.9 with Data Protection Central OS Update dpc-osupdate-1.1.24-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Versions 19.8 through 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 Versions 19.8 through 19.12(2) with Data Protection Central OS Update dpc-osupdate-1.1.24-1 Apply Latest Data Protection Central OS Update
PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) Data Protection Central OS Update for Power Protect DP Series Appliances Versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.24-1 Version 2.7.9 with Data Protection Central OS Update dpc-osupdate-1.1.24-1 Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. (2)Versions 19.8 through 19.12 covers DPC version 19.8.x, 19.9.x, 19.10.x, 19.11.x, 19.12.x.
  3. To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
  4. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.24-1

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions. 

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers  (Link will be updated once the release is done)

See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs  (Link will be updated once the release is done)

 

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.24-1 

NOTE: To ensure a successful OS update for DPC versions 19.9.x and 19.10.x, please refer to DPC: Fixing DPC IAM Service Failure Due to Docker Port Configuration Issue | Dell US before applying the update.

Endringshistorikk

RevisionDateDescription
1.02025-09-23Initial Release
2.02025-09-23Minor formatting adjustments
3.02025-12-22Updated for enhanced presentation with no changes to content

Relatert informasjon

Berørte produkter

Data Protection Central, Data Protection Suite Series
Artikkelegenskaper
Artikkelnummer: 000372522
Artikkeltype: Dell Security Advisory
Sist endret: 22 des. 2025
Få svar på spørsmålene dine fra andre Dell-brukere
Støttetjenester
Sjekk om enheten din er dekket av støttetjenestene.