DSA-2023-379: Security Update for Dell Data Protection Central

Podsumowanie: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Ten artykuł dotyczy Ten artykuł nie dotyczy Ten artykuł nie jest powiązany z żadnym konkretnym produktem. Nie wszystkie wersje produktu zostały zidentyfikowane w tym artykule.

Skutki

Critical

Szczegóły

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2020-19726, CVE-2020-22218, CVE-2021-32256, CVE-2022-35205, CVE-2022-35206, CVE-2022-36402, CVE-2022-40982, CVE-2022-41409, CVE-2022-41804, CVE-2022-4285, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0459, CVE-2023-0687, CVE-2023-1264, CVE-2023-1355, CVE-2023-1579, CVE-2023-1972, CVE-2023-2007, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-20900, CVE-2023-2222, CVE-2023-23908, CVE-2023-2426, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2023-2609, CVE-2023-2610, CVE-2023-28840, CVE-2023-28841, CVE-2023-28842, CVE-2023-2985, CVE-2023-3341, CVE-2023-34319, CVE-2023-35001, CVE-2023-3567, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-38039, CVE-2023-3812, CVE-2023-3817, CVE-2023-3863, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4039, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 See SUSE link below for individual scores for each CVE. 
https://www.suse.com/security/cve/ This hyperlink is taking you to a website outside of Dell Technologies.
 
Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2020-19726, CVE-2020-22218, CVE-2021-32256, CVE-2022-35205, CVE-2022-35206, CVE-2022-36402, CVE-2022-40982, CVE-2022-41409, CVE-2022-41804, CVE-2022-4285, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-0459, CVE-2023-0687, CVE-2023-1264, CVE-2023-1355, CVE-2023-1579, CVE-2023-1972, CVE-2023-2007, CVE-2023-20569, CVE-2023-20588, CVE-2023-20593, CVE-2023-20900, CVE-2023-2222, CVE-2023-23908, CVE-2023-2426, CVE-2023-25585, CVE-2023-25587, CVE-2023-25588, CVE-2023-2609, CVE-2023-2610, CVE-2023-28840, CVE-2023-28841, CVE-2023-28842, CVE-2023-2985, CVE-2023-3341, CVE-2023-34319, CVE-2023-35001, CVE-2023-3567, CVE-2023-36054, CVE-2023-3609, CVE-2023-3611, CVE-2023-3772, CVE-2023-3776, CVE-2023-38039, CVE-2023-3812, CVE-2023-3817, CVE-2023-3863, CVE-2023-39615, CVE-2023-4016, CVE-2023-40217, CVE-2023-40283, CVE-2023-4039, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4156, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 See SUSE link below for individual scores for each CVE. 
https://www.suse.com/security/cve/ This hyperlink is taking you to a website outside of Dell Technologies.
 
Firma Dell Technologies zaleca wszystkim klientom uwzględnienie zarówno wyniku podstawowego CVSS, jak i wszelkich istotnych wyników czasowych i środowiskowych, które mogą mieć wpływ na potencjalną dotkliwość związaną z konkretną luką w zabezpieczeniach.

Produkty, których dotyczy problem, i środki zaradcze

Product Affected Versions Remediated Versions Link
Dell Data Protection Central Version 19.4 through 19.9.0-12 Version 19.4 through 19.9.0-12 (2) Apply Latest Data Protection Central OS Update
PowerProtect DP Series Appliance  (IDPA) Version 2.6.1 through 2.7.4 Version 2.7 or later with DPC OS update September 2023 patch Apply Latest Data Protection Central OS Update
Product Affected Versions Remediated Versions Link
Dell Data Protection Central Version 19.4 through 19.9.0-12 Version 19.4 through 19.9.0-12 (2) Apply Latest Data Protection Central OS Update
PowerProtect DP Series Appliance  (IDPA) Version 2.6.1 through 2.7.4 Version 2.7 or later with DPC OS update September 2023 patch Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. Versions 19.4 through 19.9.0-12 covers DPC version 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x.
  3. Versions 2.7 or later covers Power Protect DP Series Appliances version 2.7.x

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions.
For PowerProtect DP Series (IDPA) Appliances running PowerProtect DP Series below 2.7, the appliance should be first upgraded to any 2.7.x version (Version 2.7.2 is for non DP4400 model and Version 2.7.4 for DP4400 model) and then the aforementioned DP Central patch should be applied.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.16-1
 

Historia zmian

RevisionDateDescription
1.02023-10-19Initial Release

Powiązane informacje

Produkty, których dotyczy problem

Data Protection Central, PowerProtect Data Protection Appliance, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
Właściwości artykułu
Numer artykułu: 000218736
Typ artykułu: Dell Security Advisory
Ostatnia modyfikacja: 19 wrz 2025
Znajdź odpowiedzi na swoje pytania u innych użytkowników produktów Dell
Usługi pomocy technicznej
Sprawdź, czy Twoje urządzenie jest objęte usługą pomocy technicznej.