DELLTechnologies-LOGO

DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-product

Informasi produk

Spesifikasi

  • Jeneng produk: Dell Avamar Platform OS Security Patch
    Rollup
  • Versi: 2024R1
  • Produsen: Dell Inc.
  • Didhukung Produk:
    • server Avamar
    • Avamar gabungan proxy
    • Avamar Virtual Edition (AVE)
    • Avamar Data Store (ADS)
    • Avamar NDMP akselerator node
    • NetWorker Virtual Edition (NVE)
    • PowerProtect DP Series Appliance / Pangreksan Data Integrasi
      Perkakas (IDPA)
  • Komponen pihak katelu sing dianyari:
    • Java Runtime Environment (JRE)
    • Apache Tomcat
    • Paket BSAFE OwB FIPS

Pandhuan Panggunaan Produk

  • Yen dibutuhake, tindakake langkah iki kanggo mbebasake spasi ing server / volume boot nalika nglamar OS keamanan patch rollup ing ADS.

CATETAN: Priksa manawa kabeh node ing server multi-node duwe ruang kosong sing dibutuhake ing volume / boot.

FAQ

  • Q: Pira papan kosong sing dibutuhake ing volume / boot nalika ngetrapake Rollup Keamanan?
  • A: Ruang kosong sing dibutuhake ing volume / boot yaiku 80MB nalika nggunakake Rollup Keamanan kanthi manual. Nalika nglamar liwat Avinstaller, jumlah sing dibutuhake bisa beda-beda adhedhasar versi rollup. Deleng dokumentasi kanggo syarat tartamtu.
  • Q: Produk endi sing didhukung dening Rollup Patch Keamanan OS iki?
  • A: Rollup iki ditrapake kanggo server Avamar, proxy gabungan Avamar, Avamar Virtual Edition (AVE), Avamar Data Store (ADS), Avamar NDMP akselerator node, NetWorker Virtual Edition (NVE), PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA).

Cathetan rilis iki ngemot informasi tambahan babagan gulung tembelan keamanan Avamar OS lan dhaptar kerentanan lan eksposur (CVE) umum sing ditangani ing 2024R1. Kanggo dhaptar CVE sing ana gandhengane karo 2019R4 lan rollups patch keamanan OS sadurunge, deleng Cathetan Rilis Batal Patch Keamanan Avamar Platform OS.
Cathetan rilis iki kalebu bagean ing ngisor iki:

Riwayat revisi

Tabel ing ngisor iki nampilake riwayat revisi dokumen iki.
Tabel 1. Riwayat revisi

Revisi Tanggal Katrangan
01 April, 2024 Rilis pisanan dokumen iki kanggo 2024R1.

Avamar platform OS keamanan patch rollup

Rollup patch keamanan OS platform Avamar ngotomatisasi langkah-langkah sing dibutuhake kanggo ngetrapake keamanan lan nganyari sistem operasi sing dirilis sacara periodik ing antarane rilis piranti lunak server Avamar sing dijadwalake.
Cathetan rilis iki nyedhiyakake dhaptar kerentanan lan eksposur umum (CVEs) sing ditangani saben patch keamanan.
Patch keamanan sing kadhaptar ing dokumen iki ditrapake kanggo produk ing ngisor iki:

  • server Avamar
  • Avamar gabungan proxy
  • Avamar Virtual Edition (AVE)
  • Avamar Data Store (ADS)
  • Avamar NDMP akselerator node
  • NetWorker Virtual Edition (NVE)
  • PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)

Artikel KB Advisory Keamanan Dell (DSA) paling anyar kanggo produk kasebut ing situs Dhukungan nyedhiyakake matriks dhukungan.
Rollup patch keamanan OS platform Avamar iki uga nganyari komponen pihak katelu ing ngisor iki, yen ana:

  • Java Runtime Environment (JRE)
  • Apache Tomcat
  • Paket BSAFE OwB FIPS

Volume resik / boot

  • Yen dibutuhake, tindakake prosedur iki kanggo mbebasake spasi ing server / volume boot nalika sampeyan ngetrapake rollup patch keamanan OS ing ADS.

Babagan tugas iki

CATETAN: Kanggo mesthekake kabeh simpul ing server multi-node duwe ruang kosong sing dibutuhake ing volume / boot, tindakake prosedur iki ing simpul sarana, kabeh simpul panyimpenan, simpul cadangan, lan simpul akselerator (yen ana).
CATETAN: Yen sampeyan nggunakake Rollup Keamanan kanthi manual, jumlah ruang kosong sing dibutuhake ing volume / boot yaiku 80MB.

Nalika sampeyan ngetrapake rollup liwat installer, jumlah ruang kosong sing dibutuhake ing volume / boot beda-beda ing antarane rilis rollup.
Tabel ing ngisor iki nemtokake jumlah spasi gratis sing dibutuhake kanggo rollup. Bandingake nilai iki kanggo ruang bebas sing diamati. Nalika rollup ditrapake kanthi manual, jumlah ruang kosong sing dibutuhake ing volume / boot yaiku 80MB kanggo saben rilis.

Tabel 2. Sasaran papan bebas

Versi rollup Target ruang bebas
2022R1 lan mengko NA

Langkah-langkah

Bukak cangkang perintah lan mlebu kanthi nggunakake salah sawijining cara ing ngisor iki:

  • Kanggo server simpul siji, mlebu menyang server minangka admin, banjur ngalih pangguna menyang root kanthi mbukak su -.
  • Kanggo server multi-node, mlebu menyang simpul sarana minangka admin, banjur ngalih pangguna menyang root kanthi mbukak su -.
  • Priksa ukuran lan ruang kosong ing volume / boot kanthi ngetik printah ing ngisor iki: df -h /boot/

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-FIG-1

  • Verifikasi manawa volume kasebut cocog karo target ruang kosong kanggo versi rollup iki.
  • Priksa *-dump files ing volume / boot kanthi ngetik printah ing ngisor iki: ls -l /boot/*kdump
  • Informasi sing padha karo ing ngisor iki ditampilake ing cangkang perintah:

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-FIG-2

  • Mbusak kdump files ing volume / boot kanthi ngetik printah ing ngisor iki: rm /boot/*kdump
  • Dhaptar kernel sing diinstal kanthi ngetik printah ing ngisor iki: rpm -qa |grep kernel-default

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-FIG-3

  • Tampilake versi kernel sing mlaku kanthi ngetik printah ing ngisor iki: uname -a

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-FIG-4

  • Ngenali sembarang kernel lawas saka dhaptar kernel diinstal. Ngilangi versi kernel sing mlaku.
  • Yen ana, mbusak kernel lawas kanthi ngetik printah ing ngisor iki ing siji baris: rpm -ev kernel-default-VERSION_OLD kernel-default-base-VERSION_OLD
  • Priksa kernel sing diinstal lan mlaku maneh kanggo kernel lawas fileing /boot. Yen ana, copot kanthi manual.
  • Priksa arsip .gz files ing volume / boot kanthi ngetik printah ing ngisor iki: ls -l /boot/*.gz

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-FIG-5

  • Yen perlu, mbusak sembarang arsip .gz files ing volume / boot kanthi ngetik printah ing ngisor iki: rm /boot/*.gz
  • Yen spasi ing volume / boot isih ora cukup (kurang saka 80MB) (kanggo instalasi manual), serep lan copot kernel sing mlaku: mkdir /usr/local/avamar/var/rollup_bak mv /boot/*VERSION_NEW* /usr /local/avamar/var/rollup_bak

CATETAN: Sawise instalasi rollup keamanan rampung, aja lali mulihake kernel sing mlaku files kanthi tindakake langkah 14.

  • Priksa ukuran lan ruang kosong ing volume / boot kanthi ngetik printah ing ngisor iki: df -h /boot/
  • Kanggo instalasi manual, sawise instalasi rollup rampung, mulihake kernel sing mlaku (yen gawe serep wis rampung ing langkah 12) kanthi ngetik printah ing ngisor iki: mv /usr/local/avamar/var/rollup_bak/*-default /boot rm -r /usr/local/avamar/var/rollup_bak

2024R1 CVEs
Rilis iki ngemot patch kanggo CVE ing ngisor iki, kaya sing dituduhake dening platform kasebut. Deleng spreadsheet sing kalebu saben rilis kanggo rincian CVE, kalebu paket lan RPM sing ditrapake files.

Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo server Avamar
CVEs ing bagean iki ditrapake kanggo SLES 12 SP5 ing server Avamar.
Tabel 3. 2024R1 CVEs kanggo SLES 12 SP5 ing server Avamar

CVE-2007-4559 CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176
CVE-2014-0017 CVE-2014-8132 CVE-2015-20107 CVE-2015-3146 CVE-2015-8325
CVE-2015-8668 CVE-2016-0739 CVE-2016-0777 CVE-2016-0778 CVE-2016-10009
CVE-2016-10010 CVE-2016-10011 CVE-2016-10012 CVE-2016-6210 CVE-2016-6515
CVE-2016-8858 CVE-2017-5849 CVE-2018-10933 CVE-2018-20685 CVE-2019-14889
CVE-2019-17540 CVE-2019-25162 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111
CVE-2020-10735 CVE-2020-16135 CVE-2020-1730 CVE-2020-21679 CVE-2020-27783
CVE-2020-36773 CVE-2020-36777 CVE-2020-36784 CVE-2021-20224 CVE-2021-28041
CVE-2021-28861 CVE-2021-28957 CVE-2021-33631 CVE-2021-3634 CVE-2021-41617
CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924 CVE-2021-46929
CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991 CVE-2021-46992
CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077 CVE-2021-47078
CVE-2022-32545 CVE-2022-32546 CVE-2022-32547 CVE-2022-40899 CVE-2022-44267
CVE-2022-44268 CVE-2022-45061 CVE-2022-4806 CVE-2022-48337 CVE-2022-48339
CVE-2022-48564 CVE-2022-48565 CVE-2022-48566 CVE-2022-48627 CVE-2023-1289
CVE-2023-1667 CVE-2023-2283 CVE-2023-24329 CVE-2023-27043 CVE-2023-28746
CVE-2023-3195 CVE-2023-34151 CVE-2023-35827 CVE-2023-3745 CVE-2023-38408
CVE-2023-38469 CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175
CVE-2023-42465 CVE-2023-45322 CVE-2023-46343 CVE-2023-46838 CVE-2023-47233
CVE-2023-4750 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 CVE-2023-48234
CVE-2023-48235 CVE-2023-48236 CVE-2023-48237 CVE-2023-48706 CVE-2023-48795
CVE-2023-51042 CVE-2023-51043 CVE-2023-51385 CVE-2023-51780 CVE-2023-51782
CVE-2023-52340 CVE-2023-52356 CVE-2023-52429 CVE-2023-52443 CVE-2023-52445
CVE-2023-52449 CVE-2023-52451 CVE-2023-52464 CVE-2023-52475 CVE-2023-52478
CVE-2023-52482 CVE-2023-52502 CVE-2023-52530 CVE-2023-52531 CVE-2023-52532
CVE-2023-52574 CVE-2023-52597 CVE-2023-52605 CVE-2023-5341 CVE-2023-5388
CVE-2023-5752 CVE-2023-6004 CVE-2023-6040 CVE-2023-6356 CVE-2023-6535
CVE-2023-6536 CVE-2023-6597 CVE-2023-6918 CVE-2024-0340 CVE-2024-0607
CVE-2024-0727 CVE-2024-0775 CVE-2024-0985 CVE-2024-1086 CVE-2024-1151
CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20922 CVE-2024-20923
CVE-2024-20925 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952 CVE-2024-22667
CVE-2024-23849 CVE-2024-23851 CVE-2024-25062 CVE-2024-26585 CVE-2024-26595
CVE-2024-26600 CVE-2024-26622

Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo proxy gabungan Avamar
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing proxy gabungan Avamar.
Tabel 4. 2024R1 CVEs kanggo SLES 12 SP5 ing proxy gabungan Avamar

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-48627 CVE-2023-1667 CVE-2023-22655 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-38575 CVE-2023-39368 CVE-2023-40217 CVE-2023-40745
CVE-2023-41175 CVE-2023-43490 CVE-2023-46343 CVE-2023-46838 CVE-2023-47233
CVE-2023-4750 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 CVE-2023-48234
CVE-2023-48235 CVE-2023-48236 CVE-2023-48237 CVE-2023-48706 CVE-2023-48795
CVE-2023-51042 CVE-2023-51043 CVE-2023-51385 CVE-2023-51780 CVE-2023-51782
CVE-2023-52340 CVE-2023-52356 CVE-2023-52429 CVE-2023-52443 CVE-2023-52445
CVE-2023-52449 CVE-2023-52451 CVE-2023-52464 CVE-2023-52475 CVE-2023-52478
CVE-2023-52482 CVE-2023-52502 CVE-2023-52530 CVE-2023-52531 CVE-2023-52532
CVE-2023-52574 CVE-2023-52597 CVE-2023-52605 CVE-2023-5752 CVE-2023-6004
CVE-2023-6040 CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597
CVE-2023-6918 CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775
CVE-2024-1086 CVE-2024-1151 CVE-2024-20918 CVE-2024-20919 CVE-2024-20921
CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926 CVE-2024-20945
CVE-2024-20952 CVE-2024-22667 CVE-2024-23849 CVE-2024-23851 CVE-2024-25062
CVE-2024-26585 CVE-2024-26595 CVE-2024-26600 CVE-2024-26622

Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo NVE
CVEs ing bagean iki ditrapake kanggo SLES 12 SP5 ing NVE.

Tabel 5. 2024R1 CVEs kanggo SLES 12 SP5 ing NVE

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-4806 CVE-2022-48627 CVE-2023-1667 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175 CVE-2023-42465
CVE-2023-46343 CVE-2023-46838 CVE-2023-47233 CVE-2023-4750 CVE-2023-48231
CVE-2023-48232 CVE-2023-48233 CVE-2023-48234 CVE-2023-48235 CVE-2023-48236
CVE-2023-48237 CVE-2023-48706 CVE-2023-48795 CVE-2023-51042 CVE-2023-51043
CVE-2023-51385 CVE-2023-51780 CVE-2023-51782 CVE-2023-52340 CVE-2023-52356
CVE-2023-52429 CVE-2023-52443 CVE-2023-52445 CVE-2023-52449 CVE-2023-52451
CVE-2023-52464 CVE-2023-52475 CVE-2023-52478 CVE-2023-52482 CVE-2023-52502
CVE-2023-52530 CVE-2023-52531 CVE-2023-52532 CVE-2023-52574 CVE-2023-52597
CVE-2023-52605 CVE-2023-5388 CVE-2023-5752 CVE-2023-6004 CVE-2023-6040
CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597 CVE-2023-6918
CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775 CVE-2024-1086
CVE-2024-1151 CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20922
CVE-2024-20923 CVE-2024-20925 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952
CVE-2024-22667 CVE-2024-23849 CVE-2024-23851 CVE-2024-25062 CVE-2024-26585
CVE-2024-26595 CVE-2024-26600 CVE-2024-26622

Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo simpul akselerator NDMP
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing simpul akselerator NDMP.
Tabel 6. 2024R1 CVEs kanggo SLES 12 SP5 ing simpul akselerator NDMP

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-4806 CVE-2022-48627 CVE-2023-1667 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175 CVE-2023-42465
CVE-2023-46343 CVE-2023-46838 CVE-2023-47233 CVE-2023-4750 CVE-2023-48231
CVE-2023-48232 CVE-2023-48233 CVE-2023-48234 CVE-2023-48235 CVE-2023-48236
CVE-2023-48237 CVE-2023-48706 CVE-2023-48795 CVE-2023-51042 CVE-2023-51043
CVE-2023-51385 CVE-2023-51780 CVE-2023-51782 CVE-2023-52340 CVE-2023-52356
CVE-2023-52429 CVE-2023-52443 CVE-2023-52445 CVE-2023-52449 CVE-2023-52451
CVE-2023-52464 CVE-2023-52475 CVE-2023-52478 CVE-2023-52482 CVE-2023-52502
CVE-2023-52530 CVE-2023-52531 CVE-2023-52532 CVE-2023-52574 CVE-2023-52597
CVE-2023-52605 CVE-2023-5388 CVE-2023-5752 CVE-2023-6004 CVE-2023-6040
CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597 CVE-2023-6918
CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775 CVE-2024-0985
CVE-2024-1086 CVE-2024-1151 CVE-2024-1441 CVE-2024-20918 CVE-2024-20919
CVE-2024-20921 CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926
CVE-2024-20945 CVE-2024-20952 CVE-2024-22667 CVE-2024-23849 CVE-2024-23851
CVE-2024-2496 CVE-2024-25062 CVE-2024-26585 CVE-2024-26595 CVE-2024-26600
CVE-2024-26622

Dhaptar SUSE Linux Enterprise Server 12 SP5 CVE kanggo simpul akselerator ADS Gen5A NDMP
CVE ing bagean iki ditrapake kanggo SLES 12 SP5 ing simpul akselerator ADS Gen5A NDMP.
Tabel 7. 2024R1 CVEs kanggo SLES 12 SP5 ing simpul akselerator ADS Gen5A NDMP

CVE-2015-8325 CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010
CVE-2016-10011 CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858
CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-26555
CVE-2021-28041 CVE-2021-33631 CVE-2021-41617 CVE-2022-2586 CVE-2023-0461
CVE-2023-31083 CVE-2023-38408 CVE-2023-39197 CVE-2023-39198 CVE-2023-45863
CVE-2023-45871 CVE-2023-46838 CVE-2023-47233 CVE-2023-48795 CVE-2023-51042
CVE-2023-51043 CVE-2023-51385 CVE-2023-51779 CVE-2023-51780 CVE-2023-51782
CVE-2023-5717 CVE-2023-6040 CVE-2023-6121 CVE-2023-6356 CVE-2023-6535
CVE-2023-6536 CVE-2023-6606 CVE-2023-6610 CVE-2023-6931 CVE-2023-6932
CVE-2024-0340 CVE-2024-0775 CVE-2024-1086 CVE-2024-20918 CVE-2024-20919
CVE-2024-20921 CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926
CVE-2024-20945 CVE-2024-20952

Cathetan, cautions, lan bebaya

CATETAN: CATETAN nuduhake informasi penting sing mbantu sampeyan nggunakake produk kanthi luwih apik.
AWAS: AWAS nuduhake karusakan potensial kanggo hardware utawa mundhut data lan ngandhani carane supaya masalah.
WARNING: PÈNGET nuduhake potensial karusakan properti, ciloko pribadi, utawa pati.

© 2017 – 2024 Dell Inc. utawa anak perusahaan. Kabeh hak dilindhungi undhang-undhang. Dell Technologies, Dell, lan merek dagang liyane minangka merek dagang Dell Inc. utawa anak perusahaan. Merek dagang liyane bisa uga merek dagang saka sing nduweni.

Dokumen / Sumber Daya

DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup [pdf] Pandhuan pangguna
Server Avamar, proxy gabungan Avamar, Avamar Virtual Edition AVE, Avamar Data Store ADS, Avamar NDMP akselerator node, NetWorker Virtual Edition NVE, PowerProtect DP Series Appliance-Integrated Data Protection Appliance IDPA, Avamar Server Avamar Platform OS Security Patch Rollup, Server Avamar Platform Rollup Patch Keamanan OS, Rollup Patch Keamanan OS Platform Avamar, Rollup Patch Keamanan OS, Rollup Patch Keamanan, Rollup Patch

Referensi

Ninggalake komentar

Alamat email sampeyan ora bakal diterbitake. Kolom sing dibutuhake ditandhani *