Zu den Hauptinhalten
  • Bestellungen schnell und einfach aufgeben
  • Bestellungen anzeigen und den Versandstatus verfolgen
  • Profitieren Sie von exklusiven Prämien und Rabatten für Mitglieder
  • Erstellen Sie eine Liste Ihrer Produkte, auf die Sie jederzeit zugreifen können.
  • Verwalten Sie mit der Unternehmensverwaltung Ihre Dell EMC Seiten, Produkte und produktspezifischen Kontakte.

DSA-2024-348 : Security update for Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Security Update for Multiple Vulnerabilities

Zusammenfassung: Dell Avamar, Dell NetWorker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance /Integrated Data Protection Appliance (IDPA) remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system. ...

Dieser Artikel gilt für   Dieser Artikel gilt nicht für 

Auswirkungen

Critical

Details

Third-party Component CVEs More Information
Oracle JRE 8u411 CVE-2023-41993, CVE-2024-21002, CVE-2024-21003, CVE-2024-21004, CVE-2024-21005, CVE-2024-21011, CVE-2024-21085, CVE-2024-21094 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies., cpuapr2024This hyperlink is taking you to a website outside of Dell Technologies.
kernel-default
 
CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47074, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48697, CVE-2022-48701, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42445, CVE-2023-4244, CVE-2023-42755, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52527, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52586, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26625, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26828, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26874, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26948, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26993, CVE-2024-26996, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954,  See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies. , SUSE-SU-2024:1648-1This hyperlink is taking you to a website outside of Dell Technologies.
Apache2-prefork & Apache2-utils CVE-2023-38709, CVE-2024-24795, CVE-2024-27316 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Apache2-mod_jk CVE-2018-1323, CVE-2023-41081 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Bind-utils CVE-2023-4408, CVE-2023-50387, CVE-2023-50868 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Cups CVE-2024-35235 https://nvd.nist.gov/vuln/detail/CVE-2024-35235This hyperlink is taking you to a website outside of Dell Technologies.
Curl CVE-2024-2004, CVE-2024-2398 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Emacs CVE-2024-30203, CVE-2024-30204, CVE-2024-30205, CVE-2024-39331 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Gdk-pixbuf-lang CVE-2022-48622 https://nvd.nist.gov/vuln/detail/CVE-2022-48622This hyperlink is taking you to a website outside of Dell Technologies.
Artifex Ghostscript CVE-2023-52722, CVE-2024-29510, CVE-2024-33869, CVE-2024-33870, CVE-2024-33871 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
GLib2
 
CVE-2024-34397 https://nvd.nist.gov/vuln/detail/CVE-2024-34397This hyperlink is taking you to a website outside of Dell Technologies.
Glibc CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
Krb5 CVE-2021-37750, CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
less CVE-2022-48624, CVE-2024-32487 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
libarchive13 CVE-2024-20696 https://nvd.nist.gov/vuln/detail/CVE-2024-20696This hyperlink is taking you to a website outside of Dell Technologies.
libavahi CVE-2023-38470, CVE-2023-38472 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
libcares2 CVE-2024-25629 https://nvd.nist.gov/vuln/detail/CVE-2024-25629This hyperlink is taking you to a website outside of Dell Technologies.
libfastjson4 CVE-2020-12762 https://nvd.nist.gov/vuln/detail/CVE-2020-12762This hyperlink is taking you to a website outside of Dell Technologies.
libjasper1 CVE-2024-31744 https://nvd.nist.gov/vuln/detail/CVE-2024-31744This hyperlink is taking you to a website outside of Dell Technologies.
libnghttp2-14 CVE-2024-28182 https://nvd.nist.gov/vuln/detail/CVE-2024-28182This hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_0_0 CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727This hyperlink is taking you to a website outside of Dell Technologies.
libopenssl1_1 CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741This hyperlink is taking you to a website outside of Dell Technologies.
libtiff5
 
CVE-2023-3164 https://nvd.nist.gov/vuln/detail/CVE-2023-3164This hyperlink is taking you to a website outside of Dell Technologies.
libxml2-2
 
CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459This hyperlink is taking you to a website outside of Dell Technologies.
libvirt-libs CVE-2024-2494 https://nvd.nist.gov/vuln/detail/CVE-2024-2494This hyperlink is taking you to a website outside of Dell Technologies.
libzypp CVE-2017-9271
 
https://nvd.nist.gov/vuln/detail/CVE-2017-9271This hyperlink is taking you to a website outside of Dell Technologies.
Opensc CVE-2023-5992 https://nvd.nist.gov/vuln/detail/CVE-2023-5992This hyperlink is taking you to a website outside of Dell Technologies.
Postfix CVE-2023-51764
 
https://nvd.nist.gov/vuln/detail/CVE-2023-51764This hyperlink is taking you to a website outside of Dell Technologies.
postgresql14 CVE-2024-4317 https://nvd.nist.gov/vuln/detail/CVE-2024-4317This hyperlink is taking you to a website outside of Dell Technologies.
python CVE-2022-48560, CVE-2023-52425, CVE-2024-0450 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
python3 CVE-2022-48566, CVE-2023-6597, CVE-2024-0397, CVE-2024-4032 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
python-requests CVE-2024-35195 https://nvd.nist.gov/vuln/detail/CVE-2024-35195This hyperlink is taking you to a website outside of Dell Technologies.
sssd CVE-2023-3758 https://nvd.nist.gov/vuln/detail/CVE-2023-3758This hyperlink is taking you to a website outside of Dell Technologies.
terminfo CVE-2023-45918 https://nvd.nist.gov/vuln/detail/CVE-2023-45918This hyperlink is taking you to a website outside of Dell Technologies.
util-linux CVE-2024-28085 https://nvd.nist.gov/vuln/detail/CVE-2024-28085This hyperlink is taking you to a website outside of Dell Technologies.
ucode-intel CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855 See NVD link below for individual scores for each CVE. 
https://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.
wget CVE-2024-38428 https://nvd.nist.gov/vuln/detail/CVE-2024-38428This hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product Affected Versions Remediated Versions Link
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar Virtual Edition Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar NDMP Accelerator Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar VMware Image Proxy  Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz
Dell Networker Virtual Edition (NVE) Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Version 2.7.x running on SLES12SP5 Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Product Affected Versions Remediated Versions Link
Dell Avamar Server Hardware Appliance Gen4T/ Gen5A Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar Virtual Edition Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 (including Azure and AWS deployments) Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar NDMP Accelerator Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
Dell Avamar VMware Image Proxy  Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.10-SP1 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/09DYJ_Avamar-Proxy-Bundle-2024-R2.tgz
Dell Networker Virtual Edition (NVE) Versions 19.4.x, 19.5.x, 19.6.x, 19.7.x, 19.8.x, 19.9.x, 19.10.x, 19.11.x running SUSE Linux Enterprise 12 SP5 Versions 19.4, 19.7, 19.8, 19.9, 19.10, 19.11 running SUSE Linux Enterprise 12 SP5 with the latest OS Security Rollup 2024R2 https://dl.dell.com/downloads/R18TG_NetWorker-Virtual-Edition-(NVE)-Platform-Security-Rollup-2024-R2.avp
Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Version 2.7.x running on SLES12SP5 Version 2.7.6 with latest AV Platform OS Security Rollup 2024R2 https://dl.dell.com/downloads/X5TFK_Avamar-Virtual-Edition-(AVE)-and-Avamar-Data-Stores-(ADS)-Platform-Security-Rollup-2024-R2.avp
  • The CVEs remedied by this security update are listed in the Release Notes.  The Release Notes list not only the new CVEs remedied by this update, but all the past CVEs included in this cumulative update.
  • For Dell Power Protect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Customers, Upgrade to PowerProtect DP 2.7.6 is strongly recommended prior to applying additional security patches. The patches can also be applied to the Appliances running PowerProtect DP 2.7.2 (all models) and PowerProtect DP 2.7.4 (DP4400 model only).
  • Dell recommends that you always upgrade to the latest release/version for your product.
  • To schedule platform security patch installation, or to upgrade your server, contact Dell Customer Support at https://www.dell.com/support/home/product-support/product/avamar/drivers

Revisionsverlauf

Revision DateDescription
1.02024-08-06Initial Release

Zugehörige Informationen

Betroffene Produkte

Avamar, NetWorker Family, PowerProtect Data Protection Appliance, Avamar, Avamar Data Store, Avamar Data Store Gen4T, Avamar Data Store Gen5A, Avamar Server, Avamar Virtual Edition, PowerProtect Data Protection Software , Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance Software, NetWorker, NetWorker Series, NetWorker Module, Product Security Information ...
Artikeleigenschaften
Artikelnummer: 000227573
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 06 Aug. 2024
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.
Artikeleigenschaften
Artikelnummer: 000227573
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 06 Aug. 2024
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.