DSA-2024-378: Security Update for Dell Cloud Tiering Appliance for Multiple Third-Party Vulnerabilities.
摘要: Dell Cloud Tiering Appliance remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
影響
High
詳細資料
| Third-party Component | CVEs | More Information |
|---|---|---|
| Kernel-default | CVE-2021-46955, CVE-2021-47041, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47184, CVE-2021-47185, CVE-2021-47194, CVE-2021-47198, CVE-2021-47201, CVE-2021-47203, CVE-2021-47206, CVE-2021-47207, CVE-2021-47212, CVE-2022-48631, CVE-2022-48651, CVE-2022-48654, CVE-2022-48687, CVE-2023-2860, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-26688, CVE-2024-26689, CVE-2024-26733, CVE-2024-26739, CVE-2024-26744CVE-2024-26816, CVE-2024-26840, CVE-2024-26852, CVE-2024-26862, CVE-2024-26898, CVE-2024-26903, CVE-2024-26906, CVE-2024-27043, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47236, CVE-2021-47239, CVE-2021-47240, CVE-2021-47246, CVE-2021-47252, CVE-2021-47254, CVE-2021-47255, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47338, CVE-2021-47341, CVE-2021-47344, CVE-2021-47347, CVE-2021-47350, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47431, CVE-2021-47434, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47445, CVE-2021-47456, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47505, CVE-2021-47506, CVE-2021-47511, CVE-2021-47516, CVE-2021-47522, CVE-2021-47527, CVE-2021-47538, CVE-2021-47541, CVE-2021-47542, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-20132, CVE-2022-48673, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914, CVE-2020-10135, CVE-2021-3896, CVE-2021-43389, CVE-2021-4439, CVE-2021-47247, CVE-2021-47311, CVE-2021-47328, CVE-2021-47368, CVE-2021-47372, CVE-2021-47379, CVE-2021-47571, CVE-2021-47583, CVE-2022-0435, CVE-2022-22942, CVE-2022-2938, CVE-2022-48711, CVE-2022-48760, CVE-2022-48771, CVE-2023-24023, CVE-2023-52707, CVE-2023-52752, CVE-2023-52881, CVE-2024-26921, CVE-2024-26923, CVE-2024-35789, CVE-2024-35861, CVE-2024-35862, CVE-2024-35864, CVE-2024-35878, CVE-2024-35950, CVE-2024-36894, CVE-2024-36904, CVE-2024-36940, CVE-2024-36964, CVE-2024-38541, CVE-2024-38545, CVE-2024-38559, CVE-2024-38560 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libxml2 | CVE-2024-25062 | https://nvd.nist.gov/vuln/detail/CVE-2024-25062 |
| perl | CVE-2017-6512, CVE-2018-6798, CVE-2018-6913, CVE-2023-31484 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| openssl-1_1 | CVE-2024-251, CVE-2024-4741 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| python3 | CVE-2023-52425, CVE-2024-0450 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| libfastjson | CVE-2020-12762 | https://nvd.nist.gov/vuln/detail/CVE-2020-12762 |
| glibc | CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| cups | CVE-2024-35235 | https://nvd.nist.gov/vuln/detail/CVE-2024-35235 |
| bind | CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517, CVE-2023-6516, CVE-2024-1737, CVE-2024-1975 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| krb5 | CVE-2024-37370, CVE-2024-37371 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| xen | CVE-2023-28746, CVE-2023-46842, CVE-2024-2193, CVE-2024-2201, CVE-2024-31142, CVE-2024-31143 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| mozilla-nss | CVE-2023-5388 | https://nvd.nist.gov/vuln/detail/CVE-2023-5388 |
| java-11-openjdk | CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147 | See NVD link below for individual scores for each CVE. http://nvd.nist.gov/ |
| skopeo | CVE-2024-28180 | https://nvd.nist.gov/vuln/detail/CVE-2024-28180 |
受影響的產品與補救措施
| Product | Software/Firmware | Affected Versions | Updated Version | Link |
|---|---|---|---|---|
| Cloud Tiering Appliance | CTA and CTA-HA | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/ product-support/product/cloud-tiering-appliance/drivers |
| Cloud Tiering Appliance | CTA/VE and CTA-HA/VE | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/product-support/product/cloud-tiering-applianceve/drivers |
| Product | Software/Firmware | Affected Versions | Updated Version | Link |
|---|---|---|---|---|
| Cloud Tiering Appliance | CTA and CTA-HA | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/ product-support/product/cloud-tiering-appliance/drivers |
| Cloud Tiering Appliance | CTA/VE and CTA-HA/VE | Versions prior to 13.2.0.2.31 | Version 13.2.0.2.31 | https://www.dell.com/support/home/product-support/product/cloud-tiering-applianceve/drivers |
修訂歷史記錄
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2024-09-02 | Initial Release |
| 2.0 | 2024-10-25 | Updated for enhanced presentation with no changes to content. |
相關資訊
法律免責聲明
受影響的產品
Cloud Tiering Appliance, Cloud Tiering Appliance, Cloud Tiering Appliance Platform, Cloud Tiering Appliance/VE文章屬性
文章編號: 000228228
文章類型: Dell Security Advisory
上次修改時間: 09 9月 2025
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。