DSA-2024-266: Security Update for Dell Data Protection Central for Multiple Security Vulnerabilities

Resumo: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Este artigo aplica-se a Este artigo não se aplica a Este artigo não está vinculado a nenhum produto específico. Nem todas as versões do produto estão identificadas neste artigo.

Impacto

Critical

Dados

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2018-11490, CVE-2021-47078, CVE-2022-48627, CVE-2023-52530, CVE-2024-26622, CVE-2019-25160, CVE-2021-47100, CVE-2022-48636, CVE-2023-52531, CVE-2024-26642, CVE-2019-25162, CVE-2021-47101, CVE-2022-48650, CVE-2023-52532, CVE-2024-26651, CVE-2020-36312, CVE-2021-47104, CVE-2022-48651, CVE-2023-52574, CVE-2024-26671, CVE-2020-36777, CVE-2021-47110, CVE-2022-48667, CVE-2023-52575, CVE-2024-26675, CVE-2020-36784, CVE-2021-47112, CVE-2022-48668, CVE-2023-52583, CVE-2024-26689, CVE-2021-23134, CVE-2021-47114, CVE-2022-48688, CVE-2023-52587, CVE-2024-26704, CVE-2021-33200, CVE-2021-47117, CVE-2022-48695, CVE-2023-52591, CVE-2024-26733, CVE-2021-40633, CVE-2021-47118, CVE-2022-48701, CVE-2023-52595, CVE-2024-26743, CVE-2021-46904, CVE-2021-47119, CVE-2023-0160, CVE-2023-52597, CVE-2024-26744, CVE-2021-46905, CVE-2021-47138, CVE-2023-22655, CVE-2023-52598, CVE-2024-26747, CVE-2021-46906, CVE-2021-47141, CVE-2023-28746, CVE-2023-52605, CVE-2024-26763, CVE-2021-46907, CVE-2021-47142, CVE-2023-35827, CVE-2023-52607, CVE-2024-26771, CVE-2021-46909, CVE-2021-47143, CVE-2023-38575, CVE-2023-52614, CVE-2024-26772, CVE-2021-46915, CVE-2021-47146, CVE-2023-39368, CVE-2023-52620, CVE-2024-26773, CVE-2021-46921, CVE-2021-47149, CVE-2023-4244, CVE-2023-52635, CVE-2024-26777, CVE-2021-46924, CVE-2021-47150, CVE-2023-42445, CVE-2023-52639, CVE-2024-26778, CVE-2021-46932, CVE-2021-47153, CVE-2023-42465, CVE-2023-52644, CVE-2024-26779, CVE-2021-46938, CVE-2021-47161, CVE-2023-43490, CVE-2023-52646, CVE-2024-26793, CVE-2021-46939, CVE-2021-47162, CVE-2023-45918, CVE-2023-52650, CVE-2024-26805, CVE-2021-46941, CVE-2021-47165, CVE-2023-46343, CVE-2023-52652, CVE-2024-26816, CVE-2021-46950, CVE-2021-47166, CVE-2023-4750, CVE-2023-52653, CVE-2024-26817, CVE-2021-46953, CVE-2021-47167, CVE-2023-48231, CVE-2023-6270, CVE-2024-26839, CVE-2021-46958, CVE-2021-47168, CVE-2023-48232, CVE-2023-6597, CVE-2024-26840, CVE-2021-46960, CVE-2021-47169, CVE-2023-48233, CVE-2023-7042, CVE-2024-26852, CVE-2021-46963, CVE-2021-47171, CVE-2023-48234, CVE-2023-7192, CVE-2024-26855, CVE-2021-46964, CVE-2021-47173, CVE-2023-48235, CVE-2024-0607, CVE-2024-26857, CVE-2021-46966, CVE-2021-47177, CVE-2023-48236, CVE-2024-0727, CVE-2024-26859, CVE-2021-46975, CVE-2021-47179, CVE-2023-48237, CVE-2024-1151, CVE-2024-26878, CVE-2021-46981, CVE-2021-47180, CVE-2023-48706, CVE-2024-2004, CVE-2024-26883, CVE-2021-46988, CVE-2021-47181, CVE-2023-52340, CVE-2024-21011, CVE-2024-26884, CVE-2021-46990, CVE-2021-47182, CVE-2023-52429, CVE-2024-21012, CVE-2024-26901, CVE-2021-46991, CVE-2021-47183, CVE-2023-52443, CVE-2024-21068, CVE-2024-26907, CVE-2021-46992, CVE-2021-47184, CVE-2023-52445, CVE-2024-21085, CVE-2024-26922, CVE-2021-46998, CVE-2021-47185, CVE-2023-52449, CVE-2024-21094, CVE-2024-26929, CVE-2021-47006, CVE-2021-47188, CVE-2023-52451, CVE-2024-2201, CVE-2024-26930, CVE-2021-47013, CVE-2021-47189, CVE-2023-52464, CVE-2024-22099, CVE-2024-26931, CVE-2021-47015, CVE-2021-47198, CVE-2023-52469, CVE-2024-22667, CVE-2024-26948, CVE-2021-47024, CVE-2021-47202, CVE-2023-52470, CVE-2024-23307, CVE-2024-26993, CVE-2021-47034, CVE-2021-47203, CVE-2023-52474, CVE-2024-23848, CVE-2024-27013, CVE-2021-47045, CVE-2021-47204, CVE-2023-52475, CVE-2024-23849, CVE-2024-27014, CVE-2021-47049, CVE-2021-47205, CVE-2023-52476, CVE-2024-23851, CVE-2024-27043, CVE-2021-47054, CVE-2021-47207, CVE-2023-52477, CVE-2024-2398, CVE-2024-27046, CVE-2021-47055, CVE-2021-47211, CVE-2023-52478, CVE-2024-24855, CVE-2024-27054, CVE-2021-47056, CVE-2021-47216, CVE-2023-52482, CVE-2024-24861, CVE-2024-27072, CVE-2021-47063, CVE-2021-47217, CVE-2023-52486, CVE-2024-26458, CVE-2024-27073, CVE-2021-47070, CVE-2022-0487, CVE-2023-52488, CVE-2024-26461, CVE-2024-27074, CVE-2021-47071, CVE-2022-1996, CVE-2023-52502, CVE-2024-26585, CVE-2024-27075, CVE-2021-47073, CVE-2022-20154, CVE-2023-52515, CVE-2024-26595, CVE-2024-27078, CVE-2021-47076, CVE-2022-48619, CVE-2023-52524, CVE-2024-26600, CVE-2024-27388, CVE-2021-47077, CVE-2022-48624, CVE-2023-52528, CVE-2024-26614, CVE-2024-28085, CVE-2024-28182, CVE-2024-32487
 
https://www.suse.com/security/cve/ This hyperlink is taking you to a website outside of Dell Technologies.
 

A Dell Technologies recomenda que todos os clientes levem em consideração a pontuação base CVSS e as pontuações temporais e ambientais pertinentes que possam afetar a gravidade potencial associada a uma vulnerabilidade de segurança específica.

Produtos afetados e soluções

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 Version 19.5 through 19.10.0-4 (2)
with Data Protection Central OS Update dpc-osupdate-1.1.19-1
Apply Latest Data Protection Central OS Update
PowerProtect DP Series
(Integrated Data Protection Appliance (IDPA) Appliance)
Data Protection Central OS Update for Power Protect DP Series Appliances Version 2.7.6 and prior Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 Version 19.5 through 19.10.0-4 (2)
with Data Protection Central OS Update dpc-osupdate-1.1.19-1
Apply Latest Data Protection Central OS Update
PowerProtect DP Series
(Integrated Data Protection Appliance (IDPA) Appliance)
Data Protection Central OS Update for Power Protect DP Series Appliances Version 2.7.6 and prior Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 Apply Latest Data Protection Central OS Update
 
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. (2)Versions 19.5 through 19.10.0-4 covers DPC version 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x.
  3. To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
  4. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.19-1

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.19-1

Histórico de revisão

RevisionDateDescription
1.02024-06-10Initial Release

Informações relacionadas

Produtos afetados

PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
Propriedades do artigo
Número do artigo: 000225893
Tipo de artigo: Dell Security Advisory
Último modificado: 19 set. 2025
Encontre as respostas de outros usuários da Dell para suas perguntas.
Serviços de suporte
Verifique se o dispositivo está coberto pelos serviços de suporte.