DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup

Informasi produk
Spesifikasi
- Jeneng produk: Dell Avamar Platform OS Security Patch
Rollup - Versi: 2024R1
- Produsen: Dell Inc.
- Didhukung Produk:
- server Avamar
- Avamar gabungan proxy
- Avamar Virtual Edition (AVE)
- Avamar Data Store (ADS)
- Avamar NDMP akselerator node
- NetWorker Virtual Edition (NVE)
- PowerProtect DP Series Appliance / Pangreksan Data Integrasi
Perkakas (IDPA)
- Komponen pihak katelu sing dianyari:
- Java Runtime Environment (JRE)
- Apache Tomcat
- Paket BSAFE OwB FIPS
Pandhuan Panggunaan Produk
- Yen dibutuhake, tindakake langkah iki kanggo mbebasake spasi ing server / volume boot nalika nglamar OS keamanan patch rollup ing ADS.
CATETAN: Priksa manawa kabeh node ing server multi-node duwe ruang kosong sing dibutuhake ing volume / boot.
FAQ
- Q: Pira papan kosong sing dibutuhake ing volume / boot nalika ngetrapake Rollup Keamanan?
- A: Ruang kosong sing dibutuhake ing volume / boot yaiku 80MB nalika nggunakake Rollup Keamanan kanthi manual. Nalika nglamar liwat Avinstaller, jumlah sing dibutuhake bisa beda-beda adhedhasar versi rollup. Deleng dokumentasi kanggo syarat tartamtu.
- Q: Produk endi sing didhukung dening Rollup Patch Keamanan OS iki?
- A: Rollup iki ditrapake kanggo server Avamar, proxy gabungan Avamar, Avamar Virtual Edition (AVE), Avamar Data Store (ADS), Avamar NDMP akselerator node, NetWorker Virtual Edition (NVE), PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA).
Cathetan rilis iki ngemot informasi tambahan babagan gulung tembelan keamanan Avamar OS lan dhaptar kerentanan lan eksposur (CVE) umum sing ditangani ing 2024R1. Kanggo dhaptar CVE sing ana gandhengane karo 2019R4 lan rollups patch keamanan OS sadurunge, deleng Cathetan Rilis Batal Patch Keamanan Avamar Platform OS.
Cathetan rilis iki kalebu bagean ing ngisor iki:
Riwayat revisi
Tabel ing ngisor iki nampilake riwayat revisi dokumen iki.
Tabel 1. Riwayat revisi
| Revisi | Tanggal | Katrangan |
| 01 | April, 2024 | Rilis pisanan dokumen iki kanggo 2024R1. |
Avamar platform OS keamanan patch rollup
Rollup patch keamanan OS platform Avamar ngotomatisasi langkah-langkah sing dibutuhake kanggo ngetrapake keamanan lan nganyari sistem operasi sing dirilis sacara periodik ing antarane rilis piranti lunak server Avamar sing dijadwalake.
Cathetan rilis iki nyedhiyakake dhaptar kerentanan lan eksposur umum (CVEs) sing ditangani saben patch keamanan.
Patch keamanan sing kadhaptar ing dokumen iki ditrapake kanggo produk ing ngisor iki:
- server Avamar
- Avamar gabungan proxy
- Avamar Virtual Edition (AVE)
- Avamar Data Store (ADS)
- Avamar NDMP akselerator node
- NetWorker Virtual Edition (NVE)
- PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)
Artikel KB Advisory Keamanan Dell (DSA) paling anyar kanggo produk kasebut ing situs Dhukungan nyedhiyakake matriks dhukungan.
Rollup patch keamanan OS platform Avamar iki uga nganyari komponen pihak katelu ing ngisor iki, yen ana:
- Java Runtime Environment (JRE)
- Apache Tomcat
- Paket BSAFE OwB FIPS
Volume resik / boot
- Yen dibutuhake, tindakake prosedur iki kanggo mbebasake spasi ing server / volume boot nalika sampeyan ngetrapake rollup patch keamanan OS ing ADS.
Babagan tugas iki
CATETAN: Kanggo mesthekake kabeh simpul ing server multi-node duwe ruang kosong sing dibutuhake ing volume / boot, tindakake prosedur iki ing simpul sarana, kabeh simpul panyimpenan, simpul cadangan, lan simpul akselerator (yen ana).
CATETAN: Yen sampeyan nggunakake Rollup Keamanan kanthi manual, jumlah ruang kosong sing dibutuhake ing volume / boot yaiku 80MB.
Nalika sampeyan ngetrapake rollup liwat installer, jumlah ruang kosong sing dibutuhake ing volume / boot beda-beda ing antarane rilis rollup.
Tabel ing ngisor iki nemtokake jumlah spasi gratis sing dibutuhake kanggo rollup. Bandingake nilai iki kanggo ruang bebas sing diamati. Nalika rollup ditrapake kanthi manual, jumlah ruang kosong sing dibutuhake ing volume / boot yaiku 80MB kanggo saben rilis.
Tabel 2. Sasaran papan bebas
| Versi rollup | Target ruang bebas |
| 2022R1 lan mengko | NA |
Langkah-langkah
Bukak cangkang perintah lan mlebu kanthi nggunakake salah sawijining cara ing ngisor iki:
- Kanggo server simpul siji, mlebu menyang server minangka admin, banjur ngalih pangguna menyang root kanthi mbukak su -.
- Kanggo server multi-node, mlebu menyang simpul sarana minangka admin, banjur ngalih pangguna menyang root kanthi mbukak su -.
- Priksa ukuran lan ruang kosong ing volume / boot kanthi ngetik printah ing ngisor iki: df -h /boot/
![]()
- Verifikasi manawa volume kasebut cocog karo target ruang kosong kanggo versi rollup iki.
- Priksa *-dump files ing volume / boot kanthi ngetik printah ing ngisor iki: ls -l /boot/*kdump
- Informasi sing padha karo ing ngisor iki ditampilake ing cangkang perintah:
![]()
- Mbusak kdump files ing volume / boot kanthi ngetik printah ing ngisor iki: rm /boot/*kdump
- Dhaptar kernel sing diinstal kanthi ngetik printah ing ngisor iki: rpm -qa |grep kernel-default

- Tampilake versi kernel sing mlaku kanthi ngetik printah ing ngisor iki: uname -a
![]()
- Ngenali sembarang kernel lawas saka dhaptar kernel diinstal. Ngilangi versi kernel sing mlaku.
- Yen ana, mbusak kernel lawas kanthi ngetik printah ing ngisor iki ing siji baris: rpm -ev kernel-default-VERSION_OLD kernel-default-base-VERSION_OLD
- Priksa kernel sing diinstal lan mlaku maneh kanggo kernel lawas fileing /boot. Yen ana, copot kanthi manual.
- Priksa arsip .gz files ing volume / boot kanthi ngetik printah ing ngisor iki: ls -l /boot/*.gz

- Yen perlu, mbusak sembarang arsip .gz files ing volume / boot kanthi ngetik printah ing ngisor iki: rm /boot/*.gz
- Yen spasi ing volume / boot isih ora cukup (kurang saka 80MB) (kanggo instalasi manual), serep lan copot kernel sing mlaku: mkdir /usr/local/avamar/var/rollup_bak mv /boot/*VERSION_NEW* /usr /local/avamar/var/rollup_bak
CATETAN: Sawise instalasi rollup keamanan rampung, aja lali mulihake kernel sing mlaku files kanthi tindakake langkah 14.
- Priksa ukuran lan ruang kosong ing volume / boot kanthi ngetik printah ing ngisor iki: df -h /boot/
- Kanggo instalasi manual, sawise instalasi rollup rampung, mulihake kernel sing mlaku (yen gawe serep wis rampung ing langkah 12) kanthi ngetik printah ing ngisor iki: mv /usr/local/avamar/var/rollup_bak/*-default /boot rm -r /usr/local/avamar/var/rollup_bak
2024R1 CVEs
Rilis iki ngemot patch kanggo CVE ing ngisor iki, kaya sing dituduhake dening platform kasebut. Deleng spreadsheet sing kalebu saben rilis kanggo rincian CVE, kalebu paket lan RPM sing ditrapake files.
Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo server Avamar
CVEs ing bagean iki ditrapake kanggo SLES 12 SP5 ing server Avamar.
Tabel 3. 2024R1 CVEs kanggo SLES 12 SP5 ing server Avamar
| CVE-2007-4559 | CVE-2012-4559 | CVE-2012-4560 | CVE-2012-4561 | CVE-2013-0176 |
| CVE-2014-0017 | CVE-2014-8132 | CVE-2015-20107 | CVE-2015-3146 | CVE-2015-8325 |
| CVE-2015-8668 | CVE-2016-0739 | CVE-2016-0777 | CVE-2016-0778 | CVE-2016-10009 |
| CVE-2016-10010 | CVE-2016-10011 | CVE-2016-10012 | CVE-2016-6210 | CVE-2016-6515 |
| CVE-2016-8858 | CVE-2017-5849 | CVE-2018-10933 | CVE-2018-20685 | CVE-2019-14889 |
| CVE-2019-17540 | CVE-2019-25162 | CVE-2019-6109 | CVE-2019-6110 | CVE-2019-6111 |
| CVE-2020-10735 | CVE-2020-16135 | CVE-2020-1730 | CVE-2020-21679 | CVE-2020-27783 |
| CVE-2020-36773 | CVE-2020-36777 | CVE-2020-36784 | CVE-2021-20224 | CVE-2021-28041 |
| CVE-2021-28861 | CVE-2021-28957 | CVE-2021-33631 | CVE-2021-3634 | CVE-2021-41617 |
| CVE-2021-46906 | CVE-2021-46915 | CVE-2021-46921 | CVE-2021-46924 | CVE-2021-46929 |
| CVE-2021-46932 | CVE-2021-46953 | CVE-2021-46974 | CVE-2021-46991 | CVE-2021-46992 |
| CVE-2021-47013 | CVE-2021-47054 | CVE-2021-47076 | CVE-2021-47077 | CVE-2021-47078 |
| CVE-2022-32545 | CVE-2022-32546 | CVE-2022-32547 | CVE-2022-40899 | CVE-2022-44267 |
| CVE-2022-44268 | CVE-2022-45061 | CVE-2022-4806 | CVE-2022-48337 | CVE-2022-48339 |
| CVE-2022-48564 | CVE-2022-48565 | CVE-2022-48566 | CVE-2022-48627 | CVE-2023-1289 |
| CVE-2023-1667 | CVE-2023-2283 | CVE-2023-24329 | CVE-2023-27043 | CVE-2023-28746 |
| CVE-2023-3195 | CVE-2023-34151 | CVE-2023-35827 | CVE-2023-3745 | CVE-2023-38408 |
| CVE-2023-38469 | CVE-2023-38471 | CVE-2023-40217 | CVE-2023-40745 | CVE-2023-41175 |
| CVE-2023-42465 | CVE-2023-45322 | CVE-2023-46343 | CVE-2023-46838 | CVE-2023-47233 |
| CVE-2023-4750 | CVE-2023-48231 | CVE-2023-48232 | CVE-2023-48233 | CVE-2023-48234 |
| CVE-2023-48235 | CVE-2023-48236 | CVE-2023-48237 | CVE-2023-48706 | CVE-2023-48795 |
| CVE-2023-51042 | CVE-2023-51043 | CVE-2023-51385 | CVE-2023-51780 | CVE-2023-51782 |
| CVE-2023-52340 | CVE-2023-52356 | CVE-2023-52429 | CVE-2023-52443 | CVE-2023-52445 |
| CVE-2023-52449 | CVE-2023-52451 | CVE-2023-52464 | CVE-2023-52475 | CVE-2023-52478 |
| CVE-2023-52482 | CVE-2023-52502 | CVE-2023-52530 | CVE-2023-52531 | CVE-2023-52532 |
| CVE-2023-52574 | CVE-2023-52597 | CVE-2023-52605 | CVE-2023-5341 | CVE-2023-5388 |
| CVE-2023-5752 | CVE-2023-6004 | CVE-2023-6040 | CVE-2023-6356 | CVE-2023-6535 |
| CVE-2023-6536 | CVE-2023-6597 | CVE-2023-6918 | CVE-2024-0340 | CVE-2024-0607 |
| CVE-2024-0727 | CVE-2024-0775 | CVE-2024-0985 | CVE-2024-1086 | CVE-2024-1151 |
| CVE-2024-20918 | CVE-2024-20919 | CVE-2024-20921 | CVE-2024-20922 | CVE-2024-20923 |
| CVE-2024-20925 | CVE-2024-20926 | CVE-2024-20945 | CVE-2024-20952 | CVE-2024-22667 |
| CVE-2024-23849 | CVE-2024-23851 | CVE-2024-25062 | CVE-2024-26585 | CVE-2024-26595 |
| CVE-2024-26600 | CVE-2024-26622 |
Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo proxy gabungan Avamar
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing proxy gabungan Avamar.
Tabel 4. 2024R1 CVEs kanggo SLES 12 SP5 ing proxy gabungan Avamar
| CVE-2012-4559 | CVE-2012-4560 | CVE-2012-4561 | CVE-2013-0176 | CVE-2014-0017 |
| CVE-2014-8132 | CVE-2015-3146 | CVE-2015-8325 | CVE-2015-8668 | CVE-2016-0739 |
| CVE-2016-0777 | CVE-2016-0778 | CVE-2016-10009 | CVE-2016-10010 | CVE-2016-10011 |
| CVE-2016-10012 | CVE-2016-6210 | CVE-2016-6515 | CVE-2016-8858 | CVE-2017-5849 |
| CVE-2018-10933 | CVE-2018-20685 | CVE-2019-14889 | CVE-2019-25162 | CVE-2019-6109 |
| CVE-2019-6110 | CVE-2019-6111 | CVE-2020-16135 | CVE-2020-1730 | CVE-2020-36773 |
| CVE-2020-36777 | CVE-2020-36784 | CVE-2021-28041 | CVE-2021-33631 | CVE-2021-3634 |
| CVE-2021-41617 | CVE-2021-46906 | CVE-2021-46915 | CVE-2021-46921 | CVE-2021-46924 |
| CVE-2021-46929 | CVE-2021-46932 | CVE-2021-46953 | CVE-2021-46974 | CVE-2021-46991 |
| CVE-2021-46992 | CVE-2021-47013 | CVE-2021-47054 | CVE-2021-47076 | CVE-2021-47077 |
| CVE-2021-47078 | CVE-2022-48627 | CVE-2023-1667 | CVE-2023-22655 | CVE-2023-2283 |
| CVE-2023-27043 | CVE-2023-28746 | CVE-2023-35827 | CVE-2023-38408 | CVE-2023-38469 |
| CVE-2023-38471 | CVE-2023-38575 | CVE-2023-39368 | CVE-2023-40217 | CVE-2023-40745 |
| CVE-2023-41175 | CVE-2023-43490 | CVE-2023-46343 | CVE-2023-46838 | CVE-2023-47233 |
| CVE-2023-4750 | CVE-2023-48231 | CVE-2023-48232 | CVE-2023-48233 | CVE-2023-48234 |
| CVE-2023-48235 | CVE-2023-48236 | CVE-2023-48237 | CVE-2023-48706 | CVE-2023-48795 |
| CVE-2023-51042 | CVE-2023-51043 | CVE-2023-51385 | CVE-2023-51780 | CVE-2023-51782 |
| CVE-2023-52340 | CVE-2023-52356 | CVE-2023-52429 | CVE-2023-52443 | CVE-2023-52445 |
| CVE-2023-52449 | CVE-2023-52451 | CVE-2023-52464 | CVE-2023-52475 | CVE-2023-52478 |
| CVE-2023-52482 | CVE-2023-52502 | CVE-2023-52530 | CVE-2023-52531 | CVE-2023-52532 |
| CVE-2023-52574 | CVE-2023-52597 | CVE-2023-52605 | CVE-2023-5752 | CVE-2023-6004 |
| CVE-2023-6040 | CVE-2023-6356 | CVE-2023-6535 | CVE-2023-6536 | CVE-2023-6597 |
| CVE-2023-6918 | CVE-2024-0340 | CVE-2024-0607 | CVE-2024-0727 | CVE-2024-0775 |
| CVE-2024-1086 | CVE-2024-1151 | CVE-2024-20918 | CVE-2024-20919 | CVE-2024-20921 |
| CVE-2024-20922 | CVE-2024-20923 | CVE-2024-20925 | CVE-2024-20926 | CVE-2024-20945 |
| CVE-2024-20952 | CVE-2024-22667 | CVE-2024-23849 | CVE-2024-23851 | CVE-2024-25062 |
| CVE-2024-26585 | CVE-2024-26595 | CVE-2024-26600 | CVE-2024-26622 |
Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo NVE
CVEs ing bagean iki ditrapake kanggo SLES 12 SP5 ing NVE.
Tabel 5. 2024R1 CVEs kanggo SLES 12 SP5 ing NVE
| CVE-2012-4559 | CVE-2012-4560 | CVE-2012-4561 | CVE-2013-0176 | CVE-2014-0017 |
| CVE-2014-8132 | CVE-2015-3146 | CVE-2015-8325 | CVE-2015-8668 | CVE-2016-0739 |
| CVE-2016-0777 | CVE-2016-0778 | CVE-2016-10009 | CVE-2016-10010 | CVE-2016-10011 |
| CVE-2016-10012 | CVE-2016-6210 | CVE-2016-6515 | CVE-2016-8858 | CVE-2017-5849 |
| CVE-2018-10933 | CVE-2018-20685 | CVE-2019-14889 | CVE-2019-25162 | CVE-2019-6109 |
| CVE-2019-6110 | CVE-2019-6111 | CVE-2020-16135 | CVE-2020-1730 | CVE-2020-36773 |
| CVE-2020-36777 | CVE-2020-36784 | CVE-2021-28041 | CVE-2021-33631 | CVE-2021-3634 |
| CVE-2021-41617 | CVE-2021-46906 | CVE-2021-46915 | CVE-2021-46921 | CVE-2021-46924 |
| CVE-2021-46929 | CVE-2021-46932 | CVE-2021-46953 | CVE-2021-46974 | CVE-2021-46991 |
| CVE-2021-46992 | CVE-2021-47013 | CVE-2021-47054 | CVE-2021-47076 | CVE-2021-47077 |
| CVE-2021-47078 | CVE-2022-4806 | CVE-2022-48627 | CVE-2023-1667 | CVE-2023-2283 |
| CVE-2023-27043 | CVE-2023-28746 | CVE-2023-35827 | CVE-2023-38408 | CVE-2023-38469 |
| CVE-2023-38471 | CVE-2023-40217 | CVE-2023-40745 | CVE-2023-41175 | CVE-2023-42465 |
| CVE-2023-46343 | CVE-2023-46838 | CVE-2023-47233 | CVE-2023-4750 | CVE-2023-48231 |
| CVE-2023-48232 | CVE-2023-48233 | CVE-2023-48234 | CVE-2023-48235 | CVE-2023-48236 |
| CVE-2023-48237 | CVE-2023-48706 | CVE-2023-48795 | CVE-2023-51042 | CVE-2023-51043 |
| CVE-2023-51385 | CVE-2023-51780 | CVE-2023-51782 | CVE-2023-52340 | CVE-2023-52356 |
| CVE-2023-52429 | CVE-2023-52443 | CVE-2023-52445 | CVE-2023-52449 | CVE-2023-52451 |
| CVE-2023-52464 | CVE-2023-52475 | CVE-2023-52478 | CVE-2023-52482 | CVE-2023-52502 |
| CVE-2023-52530 | CVE-2023-52531 | CVE-2023-52532 | CVE-2023-52574 | CVE-2023-52597 |
| CVE-2023-52605 | CVE-2023-5388 | CVE-2023-5752 | CVE-2023-6004 | CVE-2023-6040 |
| CVE-2023-6356 | CVE-2023-6535 | CVE-2023-6536 | CVE-2023-6597 | CVE-2023-6918 |
| CVE-2024-0340 | CVE-2024-0607 | CVE-2024-0727 | CVE-2024-0775 | CVE-2024-1086 |
| CVE-2024-1151 | CVE-2024-20918 | CVE-2024-20919 | CVE-2024-20921 | CVE-2024-20922 |
| CVE-2024-20923 | CVE-2024-20925 | CVE-2024-20926 | CVE-2024-20945 | CVE-2024-20952 |
| CVE-2024-22667 | CVE-2024-23849 | CVE-2024-23851 | CVE-2024-25062 | CVE-2024-26585 |
| CVE-2024-26595 | CVE-2024-26600 | CVE-2024-26622 |
Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo simpul akselerator NDMP
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing simpul akselerator NDMP.
Tabel 6. 2024R1 CVEs kanggo SLES 12 SP5 ing simpul akselerator NDMP
| CVE-2012-4559 | CVE-2012-4560 | CVE-2012-4561 | CVE-2013-0176 | CVE-2014-0017 |
| CVE-2014-8132 | CVE-2015-3146 | CVE-2015-8325 | CVE-2015-8668 | CVE-2016-0739 |
| CVE-2016-0777 | CVE-2016-0778 | CVE-2016-10009 | CVE-2016-10010 | CVE-2016-10011 |
| CVE-2016-10012 | CVE-2016-6210 | CVE-2016-6515 | CVE-2016-8858 | CVE-2017-5849 |
| CVE-2018-10933 | CVE-2018-20685 | CVE-2019-14889 | CVE-2019-25162 | CVE-2019-6109 |
| CVE-2019-6110 | CVE-2019-6111 | CVE-2020-16135 | CVE-2020-1730 | CVE-2020-36773 |
| CVE-2020-36777 | CVE-2020-36784 | CVE-2021-28041 | CVE-2021-33631 | CVE-2021-3634 |
| CVE-2021-41617 | CVE-2021-46906 | CVE-2021-46915 | CVE-2021-46921 | CVE-2021-46924 |
| CVE-2021-46929 | CVE-2021-46932 | CVE-2021-46953 | CVE-2021-46974 | CVE-2021-46991 |
| CVE-2021-46992 | CVE-2021-47013 | CVE-2021-47054 | CVE-2021-47076 | CVE-2021-47077 |
| CVE-2021-47078 | CVE-2022-4806 | CVE-2022-48627 | CVE-2023-1667 | CVE-2023-2283 |
| CVE-2023-27043 | CVE-2023-28746 | CVE-2023-35827 | CVE-2023-38408 | CVE-2023-38469 |
| CVE-2023-38471 | CVE-2023-40217 | CVE-2023-40745 | CVE-2023-41175 | CVE-2023-42465 |
| CVE-2023-46343 | CVE-2023-46838 | CVE-2023-47233 | CVE-2023-4750 | CVE-2023-48231 |
| CVE-2023-48232 | CVE-2023-48233 | CVE-2023-48234 | CVE-2023-48235 | CVE-2023-48236 |
| CVE-2023-48237 | CVE-2023-48706 | CVE-2023-48795 | CVE-2023-51042 | CVE-2023-51043 |
| CVE-2023-51385 | CVE-2023-51780 | CVE-2023-51782 | CVE-2023-52340 | CVE-2023-52356 |
| CVE-2023-52429 | CVE-2023-52443 | CVE-2023-52445 | CVE-2023-52449 | CVE-2023-52451 |
| CVE-2023-52464 | CVE-2023-52475 | CVE-2023-52478 | CVE-2023-52482 | CVE-2023-52502 |
| CVE-2023-52530 | CVE-2023-52531 | CVE-2023-52532 | CVE-2023-52574 | CVE-2023-52597 |
| CVE-2023-52605 | CVE-2023-5388 | CVE-2023-5752 | CVE-2023-6004 | CVE-2023-6040 |
| CVE-2023-6356 | CVE-2023-6535 | CVE-2023-6536 | CVE-2023-6597 | CVE-2023-6918 |
| CVE-2024-0340 | CVE-2024-0607 | CVE-2024-0727 | CVE-2024-0775 | CVE-2024-0985 |
| CVE-2024-1086 | CVE-2024-1151 | CVE-2024-1441 | CVE-2024-20918 | CVE-2024-20919 |
| CVE-2024-20921 | CVE-2024-20922 | CVE-2024-20923 | CVE-2024-20925 | CVE-2024-20926 |
| CVE-2024-20945 | CVE-2024-20952 | CVE-2024-22667 | CVE-2024-23849 | CVE-2024-23851 |
| CVE-2024-2496 | CVE-2024-25062 | CVE-2024-26585 | CVE-2024-26595 | CVE-2024-26600 |
| CVE-2024-26622 |
Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo simpul akselerator ADS Gen5A NDMP
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing simpul akselerator ADS Gen5A NDMP.
Tabel 7. 2024R1 CVEs kanggo SLES 12 SP5 ing simpul akselerator ADS Gen5A NDMP
| CVE-2015-8325 | CVE-2016-0777 | CVE-2016-0778 | CVE-2016-10009 | CVE-2016-10010 |
| CVE-2016-10011 | CVE-2016-10012 | CVE-2016-6210 | CVE-2016-6515 | CVE-2016-8858 |
| CVE-2018-20685 | CVE-2019-6109 | CVE-2019-6110 | CVE-2019-6111 | CVE-2020-26555 |
| CVE-2021-28041 | CVE-2021-33631 | CVE-2021-41617 | CVE-2022-2586 | CVE-2023-0461 |
| CVE-2023-31083 | CVE-2023-38408 | CVE-2023-39197 | CVE-2023-39198 | CVE-2023-45863 |
| CVE-2023-45871 | CVE-2023-46838 | CVE-2023-47233 | CVE-2023-48795 | CVE-2023-51042 |
| CVE-2023-51043 | CVE-2023-51385 | CVE-2023-51779 | CVE-2023-51780 | CVE-2023-51782 |
| CVE-2023-5717 | CVE-2023-6040 | CVE-2023-6121 | CVE-2023-6356 | CVE-2023-6535 |
| CVE-2023-6536 | CVE-2023-6606 | CVE-2023-6610 | CVE-2023-6931 | CVE-2023-6932 |
| CVE-2024-0340 | CVE-2024-0775 | CVE-2024-1086 | CVE-2024-20918 | CVE-2024-20919 |
| CVE-2024-20921 | CVE-2024-20922 | CVE-2024-20923 | CVE-2024-20925 | CVE-2024-20926 |
| CVE-2024-20945 | CVE-2024-20952 |
Cathetan, cautions, lan bebaya
CATETAN: CATETAN nuduhake informasi penting sing mbantu sampeyan nggunakake produk kanthi luwih apik.
AWAS: AWAS nuduhake karusakan potensial kanggo hardware utawa mundhut data lan ngandhani carane supaya masalah.
WARNING: PÈNGET nuduhake potensial karusakan properti, ciloko pribadi, utawa pati.
© 2017 – 2024 Dell Inc. utawa anak perusahaan. Kabeh hak dilindhungi undhang-undhang. Dell Technologies, Dell, lan merek dagang liyane minangka merek dagang Dell Inc. utawa anak perusahaan. Merek dagang liyane bisa uga merek dagang saka sing nduweni.
Dokumen / Sumber Daya
![]() |
DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup [pdf] Pandhuan pangguna Server Avamar, proxy gabungan Avamar, Avamar Virtual Edition AVE, Avamar Data Store ADS, Avamar NDMP akselerator node, NetWorker Virtual Edition NVE, PowerProtect DP Series Appliance-Integrated Data Protection Appliance IDPA, Avamar Server Avamar Platform OS Security Patch Rollup, Server Avamar Platform Rollup Patch Keamanan OS, Rollup Patch Keamanan OS Platform Avamar, Rollup Patch Keamanan OS, Rollup Patch Keamanan, Rollup Patch |



