DSA-2024-266: Security Update for Dell Data Protection Central for Multiple Security Vulnerabilities
摘要: Dell Data Protection Central remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
本文适用于
本文不适用于
本文并非针对某种特定的产品。
本文并非包含所有产品版本。
影响
Critical
详情
| Third-party Component | CVEs Addressed | More Information |
|---|---|---|
| SUSE Linux Enterprise Server 12 SP5 | CVE-2018-11490, CVE-2021-47078, CVE-2022-48627, CVE-2023-52530, CVE-2024-26622, CVE-2019-25160, CVE-2021-47100, CVE-2022-48636, CVE-2023-52531, CVE-2024-26642, CVE-2019-25162, CVE-2021-47101, CVE-2022-48650, CVE-2023-52532, CVE-2024-26651, CVE-2020-36312, CVE-2021-47104, CVE-2022-48651, CVE-2023-52574, CVE-2024-26671, CVE-2020-36777, CVE-2021-47110, CVE-2022-48667, CVE-2023-52575, CVE-2024-26675, CVE-2020-36784, CVE-2021-47112, CVE-2022-48668, CVE-2023-52583, CVE-2024-26689, CVE-2021-23134, CVE-2021-47114, CVE-2022-48688, CVE-2023-52587, CVE-2024-26704, CVE-2021-33200, CVE-2021-47117, CVE-2022-48695, CVE-2023-52591, CVE-2024-26733, CVE-2021-40633, CVE-2021-47118, CVE-2022-48701, CVE-2023-52595, CVE-2024-26743, CVE-2021-46904, CVE-2021-47119, CVE-2023-0160, CVE-2023-52597, CVE-2024-26744, CVE-2021-46905, CVE-2021-47138, CVE-2023-22655, CVE-2023-52598, CVE-2024-26747, CVE-2021-46906, CVE-2021-47141, CVE-2023-28746, CVE-2023-52605, CVE-2024-26763, CVE-2021-46907, CVE-2021-47142, CVE-2023-35827, CVE-2023-52607, CVE-2024-26771, CVE-2021-46909, CVE-2021-47143, CVE-2023-38575, CVE-2023-52614, CVE-2024-26772, CVE-2021-46915, CVE-2021-47146, CVE-2023-39368, CVE-2023-52620, CVE-2024-26773, CVE-2021-46921, CVE-2021-47149, CVE-2023-4244, CVE-2023-52635, CVE-2024-26777, CVE-2021-46924, CVE-2021-47150, CVE-2023-42445, CVE-2023-52639, CVE-2024-26778, CVE-2021-46932, CVE-2021-47153, CVE-2023-42465, CVE-2023-52644, CVE-2024-26779, CVE-2021-46938, CVE-2021-47161, CVE-2023-43490, CVE-2023-52646, CVE-2024-26793, CVE-2021-46939, CVE-2021-47162, CVE-2023-45918, CVE-2023-52650, CVE-2024-26805, CVE-2021-46941, CVE-2021-47165, CVE-2023-46343, CVE-2023-52652, CVE-2024-26816, CVE-2021-46950, CVE-2021-47166, CVE-2023-4750, CVE-2023-52653, CVE-2024-26817, CVE-2021-46953, CVE-2021-47167, CVE-2023-48231, CVE-2023-6270, CVE-2024-26839, CVE-2021-46958, CVE-2021-47168, CVE-2023-48232, CVE-2023-6597, CVE-2024-26840, CVE-2021-46960, CVE-2021-47169, CVE-2023-48233, CVE-2023-7042, CVE-2024-26852, CVE-2021-46963, CVE-2021-47171, CVE-2023-48234, CVE-2023-7192, CVE-2024-26855, CVE-2021-46964, CVE-2021-47173, CVE-2023-48235, CVE-2024-0607, CVE-2024-26857, CVE-2021-46966, CVE-2021-47177, CVE-2023-48236, CVE-2024-0727, CVE-2024-26859, CVE-2021-46975, CVE-2021-47179, CVE-2023-48237, CVE-2024-1151, CVE-2024-26878, CVE-2021-46981, CVE-2021-47180, CVE-2023-48706, CVE-2024-2004, CVE-2024-26883, CVE-2021-46988, CVE-2021-47181, CVE-2023-52340, CVE-2024-21011, CVE-2024-26884, CVE-2021-46990, CVE-2021-47182, CVE-2023-52429, CVE-2024-21012, CVE-2024-26901, CVE-2021-46991, CVE-2021-47183, CVE-2023-52443, CVE-2024-21068, CVE-2024-26907, CVE-2021-46992, CVE-2021-47184, CVE-2023-52445, CVE-2024-21085, CVE-2024-26922, CVE-2021-46998, CVE-2021-47185, CVE-2023-52449, CVE-2024-21094, CVE-2024-26929, CVE-2021-47006, CVE-2021-47188, CVE-2023-52451, CVE-2024-2201, CVE-2024-26930, CVE-2021-47013, CVE-2021-47189, CVE-2023-52464, CVE-2024-22099, CVE-2024-26931, CVE-2021-47015, CVE-2021-47198, CVE-2023-52469, CVE-2024-22667, CVE-2024-26948, CVE-2021-47024, CVE-2021-47202, CVE-2023-52470, CVE-2024-23307, CVE-2024-26993, CVE-2021-47034, CVE-2021-47203, CVE-2023-52474, CVE-2024-23848, CVE-2024-27013, CVE-2021-47045, CVE-2021-47204, CVE-2023-52475, CVE-2024-23849, CVE-2024-27014, CVE-2021-47049, CVE-2021-47205, CVE-2023-52476, CVE-2024-23851, CVE-2024-27043, CVE-2021-47054, CVE-2021-47207, CVE-2023-52477, CVE-2024-2398, CVE-2024-27046, CVE-2021-47055, CVE-2021-47211, CVE-2023-52478, CVE-2024-24855, CVE-2024-27054, CVE-2021-47056, CVE-2021-47216, CVE-2023-52482, CVE-2024-24861, CVE-2024-27072, CVE-2021-47063, CVE-2021-47217, CVE-2023-52486, CVE-2024-26458, CVE-2024-27073, CVE-2021-47070, CVE-2022-0487, CVE-2023-52488, CVE-2024-26461, CVE-2024-27074, CVE-2021-47071, CVE-2022-1996, CVE-2023-52502, CVE-2024-26585, CVE-2024-27075, CVE-2021-47073, CVE-2022-20154, CVE-2023-52515, CVE-2024-26595, CVE-2024-27078, CVE-2021-47076, CVE-2022-48619, CVE-2023-52524, CVE-2024-26600, CVE-2024-27388, CVE-2021-47077, CVE-2022-48624, CVE-2023-52528, CVE-2024-26614, CVE-2024-28085, CVE-2024-28182, CVE-2024-32487 |
https://www.suse.com/security/cve/ |
受影响的产品和补救措施
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
| Product | Software/Firmware | Affected Versions | Remediated Versions | Link |
|---|---|---|---|---|
| Dell Data Protection Central | Data Protection Central OS Update (SUSE SLES 12 SP5) | Version 19.5 through 19.10.0-4 with Data Protection Central OS Update prior to dpc-osupdate-1.1.18-1 | Version 19.5 through 19.10.0-4 (2) with Data Protection Central OS Update dpc-osupdate-1.1.19-1 |
Apply Latest Data Protection Central OS Update |
| PowerProtect DP Series (Integrated Data Protection Appliance (IDPA) Appliance) |
Data Protection Central OS Update for Power Protect DP Series Appliances | Version 2.7.6 and prior | Version 2.7.6 with Data Protection Central OS Update dpc-osupdate-1.1.19-1 | Apply Latest Data Protection Central OS Update |
- Platform: SUSE Linux Enterprise Server 12 SP5
- (2)Versions 19.5 through 19.10.0-4 covers DPC version 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x.
- To determine the version of Data Protection Central OS Update, examine the /etc/dpc-osupdates file for version information.
- The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdates file to confirm execution of DPC OS Update; this file will contain the line: version=1.1.19-1
To upgrade your Dell Data Protection Central system or PowerProtect DP Series Appliance Dell Data Protection Central, see https://www.dell.com/support/kbdoc/en-us/000034881/data-protection-central-how-to-install-the-data-protection-central-os-update for upgrade instructions.
See the latest ‘Data Protection Central OS Update’ file in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/drivers
See the latest ‘Data Protection Central OS Updates Release Notes’ in https://www.dell.com/support/home/en-us/product-support/product/data-protection-central/docs
The DPC version number remains the same in the DPC OS Update distribution that provides the fixes. Examine the /etc/dpc-osupdate file to confirm execution of DPC OS Update; this file will contain the line:
version=1.1.19-1
修订历史记录
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-06-10 | Initial Release |
相关信息
法律免责声明
受影响的产品
PowerProtect Data Protection Appliance, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software文章属性
文章编号: 000225893
文章类型: Dell Security Advisory
上次修改时间: 19 9月 2025
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。