DSA-2024-057: Security Update for Dell Data Protection Central for Third-Party Vulnerabilities

Сводка: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Влияние

Critical

Подробные сведения

Third-party Component CVEs Addressed More Information
SUSE Linux Enterprise Server 12 SP5 CVE-2006-2607, CVE-2012-2141, CVE-2014-2284, CVE-2014-2285, CVE-2014-3565, CVE-2015-5621, CVE-2017-7435, CVE-2017-7436, CVE-2018-9234, CVE-2020-26555, CVE-2020-36766, CVE-2022-2586,CVE-2022-33065, CVE-2022-48564, CVE-2022-48565, CVE-2022-48566, CVE-2023-0394, CVE-2023-0461, CVE-2023-1192, CVE-2023-1206, CVE-2023-1829, CVE-2023-1859, CVE-2023-2137, CVE-2023-22067, CVE-2023-22081, CVE-2023-23559, CVE-2023-23583, CVE-2023-27043, CVE-2023-2860, CVE-2023-31083, CVE-2023-31085, CVE-2023-34058, CVE-2023-34059, CVE-2023-34324, CVE-2023-3446, CVE-2023-35945, CVE-2023-38545, CVE-2023-38546, CVE-2023-39189, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39197, CVE-2023-39198, CVE-2023-39804, CVE-2023-4255, CVE-2023-42754, CVE-2023-43785, CVE-2023-43786, CVE-2023-43787, CVE-2023-44487, CVE-2023-45322, CVE-2023-45853, CVE-2023-45862, CVE-2023-45863, CVE-2023-45871, CVE-2023-46218, CVE-2023-46219, CVE-2023-4622, CVE-2023-4623, CVE-2023-46246, CVE-2023-46316, CVE-2023-4641, CVE-2023-4692, CVE-2023-4693, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4752, CVE-2023-4781, CVE-2023-4813, CVE-2023-48795, CVE-2023-4881, CVE-2023-4921, CVE-2023-50495, CVE-2023-51779, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2023-5678, CVE-2023-5717, CVE-2023-5752, CVE-2023-6121, CVE-2023-6606, CVE-2023-6610, CVE-2023-6931, CVE-2023-6932 See SUSE link below for individual scores for each CVE. https://www.suse.com/security/cve/ This hyperlink is taking you to a website outside of Dell Technologies.
 

Dell рекомендует всем клиентам учитывать как базовую оценку CVSS, так и любые временные и обусловленные средой оценки, которые могут повлиять на потенциальную степень серьезности конкретной уязвимости.

Затронутые продукты и исправление

Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.16-1 Version 19.5 through 19.10.0-4 (2)
with Data Protection Central OS Update dpc-osupdate-1.1.17-1
Apply Latest Data Protection Central OS Update
PowerProtect DP Series Appliance (IDPA) Data Protection Central OS Update for Power Protect DP Series Appliances Version 2.6.1 through 2.7.6 with Data Protection Central OS Update prior to dpc-osupdate-1.1.16-1 Version 2.7 or later (3) with Data Protection Central OS Update dpc-osupdate-1.1.17-1 Apply Latest Data Protection Central OS Update
Product Software/Firmware Affected Versions Remediated Versions Link
Dell Data Protection Central Data Protection Central OS Update (SUSE SLES 12 SP5) Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.16-1 Version 19.5 through 19.10.0-4 (2)
with Data Protection Central OS Update dpc-osupdate-1.1.17-1
Apply Latest Data Protection Central OS Update
PowerProtect DP Series Appliance (IDPA) Data Protection Central OS Update for Power Protect DP Series Appliances Version 2.6.1 through 2.7.6 with Data Protection Central OS Update prior to dpc-osupdate-1.1.16-1 Version 2.7 or later (3) with Data Protection Central OS Update dpc-osupdate-1.1.17-1 Apply Latest Data Protection Central OS Update
  1. Platform: SUSE Linux Enterprise Server 12 SP5
  2. Versions 19.5 through 19.10.0-4 covers DPC version 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x.
  3. Versions 2.7 or later covers Power Protect DP Series Appliances version 2.7.x
  4. To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
  5. The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.17-1

To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for installation instructions.
For PowerProtect DP Series (IDPA) Appliances running PowerProtect DP Series below 2.7, the appliance should be first upgraded to any 2.7.x version (Version 2.7.2 is for non DP4400 model and Version 2.7.6 for DP4400 model) and then the aforementioned DP Central patch should be applied.

See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs

The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.17-1

История изменений

RevisionDateDescription
1.02024-02-05Initial Release

Связанная информация

Затронутые продукты

Data Protection Central, PowerProtect Data Protection Appliance, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software
Свойства статьи
Номер статьи: 000221816
Тип статьи: Dell Security Advisory
Последнее изменение: 19 Sep 2025
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.