DSA-2024-266: Security Update for Dell Data Protection Central for Multiple Security Vulnerabilities
Resumo: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Este artigo aplica-se a
Este artigo não se aplica a
Este artigo não está vinculado a nenhum produto específico.
Nem todas as versões do produto estão identificadas neste artigo.
Impacto
Critical
Dados
| Third-party Component | CVEs Addressed | More Information |
|---|---|---|
| SUSE Linux Enterprise Server 12 SP5 | CVE-2018-11490, CVE-2021-47078, CVE-2022-48627, CVE-2023-52530, CVE-2024-26622, CVE-2019-25160, CVE-2021-47100, CVE-2022-48636, CVE-2023-52531, CVE-2024-26642, CVE-2019-25162, CVE-2021-47101, CVE-2022-48650, CVE-2023-52532, CVE-2024-26651, CVE-2020-36312, CVE-2021-47104, CVE-2022-48651, CVE-2023-52574, CVE-2024-26671, CVE-2020-36777, CVE-2021-47110, CVE-2022-48667, CVE-2023-52575, CVE-2024-26675, CVE-2020-36784, CVE-2021-47112, CVE-2022-48668, CVE-2023-52583, CVE-2024-26689, CVE-2021-23134, CVE-2021-47114, CVE-2022-48688, CVE-2023-52587, CVE-2024-26704, CVE-2021-33200, CVE-2021-47117, CVE-2022-48695, CVE-2023-52591, CVE-2024-26733, CVE-2021-40633, CVE-2021-47118, CVE-2022-48701, CVE-2023-52595, CVE-2024-26743, CVE-2021-46904, CVE-2021-47119, CVE-2023-0160, CVE-2023-52597, CVE-2024-26744, CVE-2021-46905, CVE-2021-47138, CVE-2023-22655, CVE-2023-52598, CVE-2024-26747, CVE-2021-46906, CVE-2021-47141, CVE-2023-28746, CVE-2023-52605, CVE-2024-26763, CVE-2021-46907, CVE-2021-47142, CVE-2023-35827, CVE-2023-52607, CVE-2024-26771, CVE-2021-46909, CVE-2021-47143, CVE-2023-38575, CVE-2023-52614, CVE-2024-26772, CVE-2021-46915, CVE-2021-47146, CVE-2023-39368, CVE-2023-52620, CVE-2024-26773, CVE-2021-46921, CVE-2021-47149, CVE-2023-4244, CVE-2023-52635, CVE-2024-26777, CVE-2021-46924, CVE-2021-47150, CVE-2023-42445, CVE-2023-52639, CVE-2024-26778, CVE-2021-46932, CVE-2021-47153, CVE-2023-42465, CVE-2023-52644, CVE-2024-26779, CVE-2021-46938, CVE-2021-47161, CVE-2023-43490, CVE-2023-52646, CVE-2024-26793, CVE-2021-46939, CVE-2021-47162, CVE-2023-45918, CVE-2023-52650, CVE-2024-26805, CVE-2021-46941, CVE-2021-47165, CVE-2023-46343, CVE-2023-52652, CVE-2024-26816, CVE-2021-46950, CVE-2021-47166, CVE-2023-4750, CVE-2023-52653, CVE-2024-26817, CVE-2021-46953, CVE-2021-47167, CVE-2023-48231, CVE-2023-6270, CVE-2024-26839, CVE-2021-46958, CVE-2021-47168, CVE-2023-48232, CVE-2023-6597, CVE-2024-26840, CVE-2021-46960, CVE-2021-47169, CVE-2023-48233, CVE-2023-7042, CVE-2024-26852, CVE-2021-46963, CVE-2021-47171, CVE-2023-48234, CVE-2023-7192, CVE-2024-26855, CVE-2021-46964, CVE-2021-47173, CVE-2023-48235, CVE-2024-0607, CVE-2024-26857, CVE-2021-46966, CVE-2021-47177, CVE-2023-48236, CVE-2024-0727, CVE-2024-26859, CVE-2021-46975, CVE-2021-47179, CVE-2023-48237, CVE-2024-1151, CVE-2024-26878, CVE-2021-46981, CVE-2021-47180, CVE-2023-48706, CVE-2024-2004, CVE-2024-26883, CVE-2021-46988, CVE-2021-47181, CVE-2023-52340, CVE-2024-21011, CVE-2024-26884, CVE-2021-46990, CVE-2021-47182, CVE-2023-52429, CVE-2024-21012, CVE-2024-26901, CVE-2021-46991, CVE-2021-47183, CVE-2023-52443, CVE-2024-21068, CVE-2024-26907, CVE-2021-46992, CVE-2021-47184, CVE-2023-52445, CVE-2024-21085, CVE-2024-26922, CVE-2021-46998, CVE-2021-47185, CVE-2023-52449, CVE-2024-21094, CVE-2024-26929, CVE-2021-47006, CVE-2021-47188, CVE-2023-52451, CVE-2024-2201, CVE-2024-26930, CVE-2021-47013, CVE-2021-47189, CVE-2023-52464, CVE-2024-22099, CVE-2024-26931, CVE-2021-47015, CVE-2021-47198, CVE-2023-52469, CVE-2024-22667, CVE-2024-26948, CVE-2021-47024, CVE-2021-47202, CVE-2023-52470, CVE-2024-23307, CVE-2024-26993, CVE-2021-47034, CVE-2021-47203, CVE-2023-52474, CVE-2024-23848, CVE-2024-27013, CVE-2021-47045, CVE-2021-47204, CVE-2023-52475, CVE-2024-23849, CVE-2024-27014, CVE-2021-47049, CVE-2021-47205, CVE-2023-52476, CVE-2024-23851, CVE-2024-27043, CVE-2021-47054, CVE-2021-47207, CVE-2023-52477, CVE-2024-2398, CVE-2024-27046, CVE-2021-47055, CVE-2021-47211, CVE-2023-52478, CVE-2024-24855, CVE-2024-27054, CVE-2021-47056, CVE-2021-47216, CVE-2023-52482, CVE-2024-24861, CVE-2024-27072, CVE-2021-47063, CVE-2021-47217, CVE-2023-52486, CVE-2024-26458, CVE-2024-27073, CVE-2021-47070, CVE-2022-0487, CVE-2023-52488, CVE-2024-26461, CVE-2024-27074, CVE-2021-47071, CVE-2022-1996, CVE-2023-52502, CVE-2024-26585, CVE-2024-27075, CVE-2021-47073, CVE-2022-20154, CVE-2023-52515, CVE-2024-26595, CVE-2024-27078, CVE-2021-47076, CVE-2022-48619, CVE-2023-52524, CVE-2024-26600, CVE-2024-27388, CVE-2021-47077, CVE-2022-48624, CVE-2023-52528, CVE-2024-26614, CVE-2024-28085, CVE-2024-28182, CVE-2024-32487 |
https://www.suse.com/security/cve/ |
Produtos afetados e soluções
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
- Platform: SUSE Linux Enterprise Server 12 SP5
- (2)Versions 19.5 through 19.10.0-4 covers DPC version 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x.
- To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.19-1
To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.
See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs
The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.19-1
Histórico de revisão
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-06-10 | Initial Release |
Informações relacionadas
Aviso de isenção legal
Produtos afetados
PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance SoftwarePropriedades do artigo
Número do artigo: 000225893
Tipo de artigo: Dell Security Advisory
Último modificado: 19 set. 2025
Encontre as respostas de outros usuários da Dell para suas perguntas.
Serviços de suporte
Verifique se o dispositivo está coberto pelos serviços de suporte.