Known issues, environmental and system requirements, and installation or update considerations associated with these patch releases are the same as the parent release. For more information, see the Data Domain Operating System, Data Domain Virtual Edition, and Data Domain Management Center 6.2.0.5 to 6.2.1.80 Release Notes (Requires Dell EMC Online Support login)
Attention: There may be security updates available for this product. You must always consult https://www.dell.com/support/security prior to commissioning search "DDOS" for any Dell Security Advisory related to this release to determine if any applicable security updates are available for download and application. We further encourage you to sign up for Security Alerts at the same URL to be proactively notified of new Security Alerts that Dell issues.
Release Revision History
Release |
Description |
6.2.1.120 |
- Initial release (April 2024)
|
6.2.1.110 |
- Initial release (December 2023)
- See DSA-2023-412 for security updates for this release.
- SE Mode has been deprecated.
- See this information before planning a DDOS update:
|
6.2.1.100 |
- Initial release (July 2023)
|
6.2.1.90 |
- Initial release (December 2022)
|
6.2.0.5-6.2.1.80 |
- Initial release (March 2020)
|
Associated Build Versions
- DDOS Build: 6.2.1.120-1095352
- DDVE Build: 6.2.1.120-1095352
- DDMC Build: 6.2.1.120-1095352
DDOS Security
Fixed Issue |
Description |
DDOS-177758 |
Strengthen DDOS and Smart Scale hashing algorithm to store passwords. |
Associated Build Versions
- DDOS Build: 6.2.1.110-1079179
- DDVE Build: 6.2.1.110-1079179
- DDMC Build: 6.2.1.110-1079179
DDOS Security
Fixed Issue |
Description |
DDOSCFD-16516 |
Remediation of escalation of privilege vulnerability. |
DDOSCFD-17123 |
Remediation of OS command injection vulnerability. |
DDOSCFD-17599 |
Remediation of OS command injection vulnerability. |
DDOSCFD-17600 |
Remediation of DOM-based XSS vulnerability. |
DDOSCFD-17601 |
Remediation of SQL injection vulnerability. |
DDOSCFD-17174 |
Remediation of improper path traversal and OS command injection vulnerabilities. |
Associated Build Versions
- DDOS Build: 6.2.1.100-1046187
- DDVE Build: 6.2.1.100-1046187
- DDMC Build: 6.2.1.100-1046187
- DDBoostFS Build: 6.2.1.100-1046187
- OST Plugin Build: 6.2.1.100-1046187
DDOS Security
Fixed Issue |
Description |
DDOS-132808 |
Security fixes to address vulnerabilities. |
DDOS-133412 |
Security fix to address vulnerabilities for DDOS and DDMC. |
DDOS-142142 |
Security fixes to address vulnerabilities. |
DDOS-151111 |
Security fixes to address vulnerabilities. |
DDOS-155253 |
Security fixes to address vulnerabilities. |
DDOS-157203 |
Security fix to mitigate CVE-2022-1292 and CVE-2022-2068. |
DDOS-161882 |
Security fix to address vulnerabilities for DDOS and DDMC. |
DDOS-169498 |
This fix reduces the validity period of a DD host certificate. |
DDOS-173372 |
Upgraded Dell BSAFE Crypto-J for FIPS 140-2 compliance. |
DDOS-173793 |
Security fix to address vulnerabilities for DDOS and DDMC. |
DDOS-193150 |
Security fix to mitigate CVE-2021-43527. |
DDOS-194227 |
Addresses password login issue. |
DDOSCFD-14078 |
Removal of SCP command in DDSH. |
DDOS Platform
Fixed Issue |
Description |
DDOS-158902 |
Security fix to address vulnerabilities for DDOS and DDMC. |
DDOSCFD-14408 |
The disk cache policy issue for DD3300 capacity expansion was disabled. |
DDOSCFD-14553 |
Alerts seen with unknown event IDs of unknown class type: EVT-ENVIRONMENT-00055 or EVT-ENVIRONMENT-00057 |
DDOSCFD-14690 |
This release fixed a false positive firmware alert which stated: "WARNING Firmware EVT-FIRMWARE-00002: One or more of the system's hardware components is running on an outdated firmware version. " |
DDOSCFD-3185 |
A segmentation fault due to race condition in the file system was seen while updating client_group_stats. |