Zu den Hauptinhalten
  • Bestellungen schnell und einfach aufgeben
  • Bestellungen anzeigen und den Versandstatus verfolgen
  • Profitieren Sie von exklusiven Prämien und Rabatten für Mitglieder
  • Erstellen Sie eine Liste Ihrer Produkte, auf die Sie jederzeit zugreifen können.

DSA-2024-422: Security Update for Dell NetWorker vProxy Multiple Component Vulnerabilities

Zusammenfassung: Dell NetWorker vProxy remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

High

Details

Third-party Component

CVEs

More Information

Bind-utils

CVE-2024-1737, CVE-2024-1975, CVE-2024-4076

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

containerd

CVE-2023-45288

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

cpio

CVE-2023-7207

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

cups-config

CVE-2024-35235

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

git-core

CVE-2024-32465, CVE-2024-32021, CVE-2024-32020, CVE-2024-32004, CVE-2024-32002, CVE-2024-24577

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

glibc

CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

Kernel-default

 

CVE-2019-25162, CVE-2020-36788, CVE-2021-46923, CVE-2021-46924, CVE-2021-46925, CVE-2021-46926, CVE-2021-46927, CVE-2021-46929, CVE-2021-46930, CVE-2021-46931, CVE-2021-46932, CVE-2021-46933, CVE-2021-46934, CVE-2021-46936, CVE-2021-47047, CVE-2021-47082, CVE-2021-47083, CVE-2021-47087, CVE-2021-47091, CVE-2021-47093, CVE-2021-47094, CVE-2021-47095, CVE-2021-47096, CVE-2021-47097, CVE-2021-47098, CVE-2021-47099, CVE-2021-47100, CVE-2021-47101, CVE-2021-47102, CVE-2021-47104, CVE-2021-47105, CVE-2021-47107, CVE-2021-47108, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47528, CVE-2021-47529, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47553, CVE-2021-47554, CVE-2021-47555, CVE-2021-47556, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2021-47571, CVE-2022-48626, CVE-2022-48627, CVE-2022-48629, CVE-2022-48630, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48699, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-24023, CVE-2023-2860, CVE-2023-28746, CVE-2023-35827, CVE-2023-47233, CVE-2023-5197, CVE-2023-52340, CVE-2023-52429, CVE-2023-52439, CVE-2023-52443, CVE-2023-52445, CVE-2023-52447, CVE-2023-52448, CVE-2023-52449, CVE-2023-52450, CVE-2023-52451, CVE-2023-52452, CVE-2023-52454, CVE-2023-52456, CVE-2023-52457, CVE-2023-52463, CVE-2023-52464, CVE-2023-52467, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52475, CVE-2023-52476, CVE-2023-52477, CVE-2023-52478, CVE-2023-52482, CVE-2023-52484, CVE-2023-52492, CVE-2023-52497, CVE-2023-52500, CVE-2023-52501, CVE-2023-52502, CVE-2023-52504, CVE-2023-52507, CVE-2023-52508, CVE-2023-52509, CVE-2023-52510, CVE-2023-52511, CVE-2023-52513, CVE-2023-52515, CVE-2023-52517, CVE-2023-52519, CVE-2023-52520, CVE-2023-52523, CVE-2023-52524, CVE-2023-52525, CVE-2023-52528, CVE-2023-52529, CVE-2023-52530, CVE-2023-52531, CVE-2023-52532, CVE-2023-52559, CVE-2023-52564, CVE-2023-52566, CVE-2023-52567, CVE-2023-52569, CVE-2023-52574, CVE-2023-52575, CVE-2023-52576, CVE-2023-52582, CVE-2023-52583, CVE-2023-52590, CVE-2023-52591, CVE-2023-52597, CVE-2023-52605, CVE-2023-52607, CVE-2023-52616, CVE-2023-52621, CVE-2023-52628, CVE-2023-52654, CVE-2023-52655, CVE-2023-52670, CVE-2023-52676, CVE-2023-52686, CVE-2023-52690, CVE-2023-52702, CVE-2023-52703, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52747, CVE-2023-52752, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52759, CVE-2023-52762, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52774, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52837, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52846, CVE-2023-52847, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-52881, CVE-2023-52885, CVE-2023-52886, CVE-2023-6270, CVE-2023-6356, CVE-2023-6531, CVE-2023-6535, CVE-2023-6536, CVE-2023-6817, CVE-2023-7042, CVE-2023-7192, CVE-2024-0607, CVE-2024-0639, CVE-2024-0841, CVE-2024-1151, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23849, CVE-2024-23850, CVE-2024-23851, CVE-2024-25742, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26586, CVE-2024-26589, CVE-2024-26591, CVE-2024-26593, CVE-2024-26595, CVE-2024-26598, CVE-2024-26600, CVE-2024-26601, CVE-2024-26602, CVE-2024-26603, CVE-2024-26607, CVE-2024-26610, CVE-2024-26614, CVE-2024-26622, CVE-2024-26642, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26704, CVE-2024-26727, CVE-2024-26733, CVE-2024-26739, CVE-2024-26745, CVE-2024-26764, CVE-2024-26766, CVE-2024-26773, CVE-2024-26792, CVE-2024-26800, CVE-2024-26813, CVE-2024-26814, CVE-2024-26816, CVE-2024-26828, CVE-2024-26840, CVE-2024-26852, CVE-2024-26862, CVE-2024-26898, CVE-2024-26903, CVE-2024-26921, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-26976, CVE-2024-27043, CVE-2024-27389, CVE-2024-27398, CVE-2024-27413, CVE-2024-35789, CVE-2024-35811, CVE-2024-35815, CVE-2024-35817, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35878, CVE-2024-35895, CVE-2024-35901, CVE-2024-35904, CVE-2024-35905, CVE-2024-35914, CVE-2024-35950, CVE-2024-36894, CVE-2024-36899, CVE-2024-36904, CVE-2024-36926, CVE-2024-36940, CVE-2024-36964, CVE-2024-36971, CVE-2024-36974, CVE-2024-38541, CVE-2024-38545, CVE-2024-38555, CVE-2024-38559, CVE-2024-38560, CVE-2024-38564, CVE-2024-38578, CVE-2024-39463, CVE-2024-39494, CVE-2024-40902, CVE-2024-40937, CVE-2024-40954, CVE-2024-40956, CVE-2024-40989, CVE-2024-40994, CVE-2024-41011, CVE-2024-41012, CVE-2024-41059, CVE-2024-41069, CVE-2024-41090, CVE-2024-42093, CVE-2024-42145, CVE-2024-42230

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

krb5

CVE-2024-26458, CVE-2024-26461, CVE-2024-37370, CVE-2024-37371

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

less

CVE-2024-32487, CVE-2022-48624

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libblkid1

CVE-2024-28085

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libcurl4

CVE-2024-2004, CVE-2024-2398

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libexpat1

CVE-2024-28757, CVE-2023-52425

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libfreebl3

CVE-2023-5388

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libgnutls30

CVE-2024-0553, CVE-2024-0567, CVE-2024-28834, CVE-2024-28835

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libnghttp2-14

CVE-2024-28182

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libopenssl1_1

CVE-2024-5535, CVE-2024-4741, CVE-2024-2511, CVE-2024-0727

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libpython3_6m1_0

CVE-2023-6597, CVE-2024-0397, CVE-2024-0450, CVE-2024-4032

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

libxml2-2

CVE-2024-25062

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

rpm

CVE-2021-3521

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

shim

CVE-2022-28737, CVE-2023-40546, CVE-2023-40547, CVE-2023-40548, CVE-2023-40549, CVE-2023-40550, CVE-2023-40551

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

sudo

CVE-2023-42465

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

ucode-intel

CVE-2023-22655, CVE-2023-38575, CVE-2023-39368, CVE-2023-43490, CVE-2023-45733, CVE-2023-45745, CVE-2023-46103, CVE-2023-47855

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

vim

CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

Go programming

CVE-2024-24790, CVE-2024-24789

See NVD link below for individual scores for each CVE.

http://nvd.nist.gov/This hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

NetWorker vProxy

vProxy OVA

Versions 19.11 through 19.11.0.1

Version 19.11.0.2 or later

https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.10 through 19.10.0.4

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.9 through 19.9.0.7

Version 19.11.0.2, 19.10.0.5 or later https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.8 through 19.8.0.4

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers 

NetWorker vProxy

vProxy OVA

Versions prior to 19.8

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers 

Product

Software/Firmware

Affected Versions

Remediated Versions

Link

NetWorker vProxy

vProxy OVA

Versions 19.11 through 19.11.0.1

Version 19.11.0.2 or later

https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.10 through 19.10.0.4

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.9 through 19.9.0.7

Version 19.11.0.2, 19.10.0.5 or later https://www.dell.com/support/home/product-support/product/networker/drivers

NetWorker vProxy

vProxy OVA

Versions 19.8 through 19.8.0.4

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers 

NetWorker vProxy

vProxy OVA

Versions prior to 19.8

Version 19.11.0.2, 19.10.0.5 or later

https://www.dell.com/support/home/product-support/product/networker/drivers 

The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

  1. Platforms: Windows & Linux (All variants and flavors are impacted)
  2. Versions prior to 19.8 mean versions 19.7.x, 19.6.x, 19.5.x family of releases that are still under standard support. For more information on Dell End-of-Life Documents for converged infrastructure, midrange and enterprise storage, and storage networking products kindly refer to: https://www.dell.com/support/kbdoc/000185734/all-dell-emc-end-of-life-documents?lang=en
  3. Unless specified as impacted, the term “later releases” encompasses all NetWorker releases, under standard support, that are of a higher minor or major version than the specified release.
  4. Dell advises that you consistently upgrade to the most recent release/version of your product.
  5. The security advisory has been updated in light of the release of Version 19.11.0.2, customers have the option to upgrade to any of the versions/releases specified in the "Affected Products and Remediation" section
  6. Direct link to download Version 19.11.0.2: NetWorker 19.11.0.2 vProxy OVA 
  7. Direct link to download Version 19.10.0.5: NetWorker 19.10.0.5 vProxy OVA 

Revisionsverlauf

Revision

Date

Description

1.0

2024-10-10

Initial Release

2.0

2024-10-14

Updated Third-Party Component Table with "Go Programming" along with impacted CVEs (CVE-2024-24790, CVE-2024-24789)

3.0

2024-11-04

The security advisory has been updated in light of the release of Version 19.11.0.2

4.0

2024-11-14

Moved the Direct download link for Version 19.11.0.2 & 19.10.0.5 under "Additional Information" section.

Added Generic download link under "Affected Products & Remediation" section.

Zugehörige Informationen

Betroffene Produkte

NetWorker Family, NetWorker, Product Security Information
Artikeleigenschaften
Artikelnummer: 000234730
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 14 Nov. 2024
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.