DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup User Guide

June 1, 2024
DELLTechnologies

DELLTechnologies-LOGO

DELLTechnologies Avamar Server Avamar Platform OS Security Patch Rollup

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
product

Product Information

Specifications

  • Product Name: Dell Avamar Platform OS Security Patch
    Rollup

  • Version: 2024R1

  • Manufacturer: Dell Inc.

  • Supported Products:

    • Avamar server
    • Avamar combined proxy
    • Avamar Virtual Edition (AVE)
    • Avamar Data Store (ADS)
    • Avamar NDMP accelerator node
    • NetWorker Virtual Edition (NVE)
    • PowerProtect DP Series Appliance/Integrated Data Protection
      Appliance (IDPA)
  • Third-party Components Updated:

    • Java Runtime Environment (JRE)
    • Apache Tomcat
    • BSAFE OwB FIPS package

Product Usage Instructions

  • If required, follow these steps to free space on the server’s /boot volume when applying the OS security patch rollup on ADS.

NOTE: Ensure all nodes in a multi-node server have the required free space on the /boot volume.

FAQ

  • Q: How much free space is required on the /boot volume when applying the Security Rollup?
  • A: The required free space on the /boot volume is 80MB when manually applying the Security Rollup. When applying via Avinstaller, the required amount may differ based on the rollup version. Refer to the documentation for specific requirements.
  • Q: Which products are supported by this OS Security Patch Rollup?
  • A: This rollup applies to Avamar server, Avamar combined proxy, Avamar Virtual Edition (AVE), Avamar Data Store (ADS), Avamar NDMP accelerator node, NetWorker Virtual Edition (NVE), PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA).

These release notes contain supplemental information about the Avamar OS security patch rollup and list the common vulnerabilities and exposures (CVEs) that are addressed in 2024R1. For the list of CVEs that pertain to 2019R4 and earlier OS security patch rollups, see Avamar Platform OS Security Patch Rollup Release Notes.
These release notes include the following sections:

Revision history

The following table presents the revision history of this document.
Table 1. Revision history

Revision Date Description
01 April, 2024 First release of this document for 2024R1.

Avamar platform OS security patch rollup

The Avamar platform OS security patch rollup automates the steps that are required to apply security and operating system updates that are periodically released between scheduled Avamar server software releases.
These release notes provide lists of the common vulnerabilities and exposures (CVEs) addressed by each security patch.
The security patches that are listed in this document apply to the following products:

  • Avamar server
  • Avamar combined proxy
  • Avamar Virtual Edition (AVE)
  • Avamar Data Store (ADS)
  • Avamar NDMP accelerator node
  • NetWorker Virtual Edition (NVE)
  • PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)

The latest Dell Security Advisory (DSA) KB article for these products on the Support site provides the support matrix.
This Avamar platform OS security patch rollup updates the following third- party components also, if present:

  • Java Runtime Environment (JRE)
  • Apache Tomcat
  • BSAFE OwB FIPS package

Clean /boot volume

  • If required, perform this procedure to free space on the server’s /boot volume when you apply the OS security patch rollup on ADS.

About this task

NOTE: To ensure all the nodes in a multi-node server have the required free space on the /boot volume, perform this procedure on the utility node, all storage nodes, spare nodes, and accelerator nodes (if applicable).
NOTE: When you manually apply the Security Rollup, the required amount of free space on the /boot volume is 80MB.

When you apply rollup via the installer, the required amount of free space on the /boot volume differs between rollup releases.
The following table determines how much free space the rollup requires. Compare this value to the observed free space. When the rollup is applied manually, the required amount of free space on the /boot volume is 80MB for every release.

Table 2. Free space targets

Rollup version Free space target
2022R1 and later NA

Steps

Open a command shell and log in by using one of the following methods:

  • For a single-node server, log in to the server as admin, and then switch user to root by running su -.
  • For a multi-node server, log in to the utility node as admin, and then switch user to root by running su -.
  • Check the size and free space on the /boot volume by typing the following command: df -h /boot/

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
FIG-1

  • Verify whether the volume meets the free space target for this rollup version.
  • Check for -dump files on the /boot volume by typing the following command: ls -l /boot/kdump
  • Information similar to the following is displayed in the command shell:

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
FIG-2

  • Remove kdump files on the/boot volume by typing the following command: rm /boot/*kdump
  • List the installed kernels by typing the following command: rpm -qa |grep kernel-default

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
FIG-3

  • Display the running kernel version by typing the following command: uname -a

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
FIG-4

  • Identify any old kernels from the list of installed kernels. Exclude the running kernel version.
  • If present, remove any old kernels by typing the following command on one line: rpm -ev kernel-default-VERSION_OLD kernel-default-base-VERSION_OLD
  • Check the installed and running kernel again for any old kernel files in /boot. If present, remove them manually.
  • Check for archived .gz files on the /boot volume by typing the following command: ls -l /boot/*.gz

DELLTechnologies-Avamar-Server-Avamar-Platform-OS-Security-Patch-Rollup-
FIG-5

  • If necessary, remove any archived .gz files on the /boot volume by typing the following command: rm /boot/*.gz
  • If the space on the /boot volume is still not enough(less than 80MB)(for manual installation), backup and remove the running kernel: mkdir /usr/local/avamar/var/rollup_bak mv /boot/VERSION_NEW /usr/local/avamar/var/rollup_bak

NOTE: After the security rollup installation is complete, do not forget to restore the running kernel files by following step 14.

  • Check the size and free space on the /boot volume by typing the following command: df -h /boot/
  • For manual installation, after rollup installation is complete, restore the running kernel (if backup up is done in step 12) by typing the following command: mv /usr/local/avamar/var/rollup_bak/*-default /boot rm -r /usr/local/avamar/var/rollup_bak

2024R1 CVEs
This release contains patches for the following CVEs, as indicated by the platform. See the spreadsheet included with each release for CVE details, including applicable packages and RPM files.

SUSE Linux Enterprise Server 12 SP5 CVE list for an Avamar server
The CVEs in this section apply to SLES 12 SP5 on an Avamar server.
Table 3. 2024R1 CVEs for SLES 12 SP5 on an Avamar server

CVE-2007-4559 CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176
CVE-2014-0017 CVE-2014-8132 CVE-2015-20107 CVE-2015-3146 CVE-2015-8325
CVE-2015-8668 CVE-2016-0739 CVE-2016-0777 CVE-2016-0778 CVE-2016-10009
CVE-2016-10010 CVE-2016-10011 CVE-2016-10012 CVE-2016-6210 CVE-2016-6515
CVE-2016-8858 CVE-2017-5849 CVE-2018-10933 CVE-2018-20685 CVE-2019-14889
CVE-2019-17540 CVE-2019-25162 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111
CVE-2020-10735 CVE-2020-16135 CVE-2020-1730 CVE-2020-21679 CVE-2020-27783
CVE-2020-36773 CVE-2020-36777 CVE-2020-36784 CVE-2021-20224 CVE-2021-28041
CVE-2021-28861 CVE-2021-28957 CVE-2021-33631 CVE-2021-3634 CVE-2021-41617
CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924 CVE-2021-46929
CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991 CVE-2021-46992
CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077 CVE-2021-47078
CVE-2022-32545 CVE-2022-32546 CVE-2022-32547 CVE-2022-40899 CVE-2022-44267
CVE-2022-44268 CVE-2022-45061 CVE-2022-4806 CVE-2022-48337 CVE-2022-48339
CVE-2022-48564 CVE-2022-48565 CVE-2022-48566 CVE-2022-48627 CVE-2023-1289
CVE-2023-1667 CVE-2023-2283 CVE-2023-24329 CVE-2023-27043 CVE-2023-28746
CVE-2023-3195 CVE-2023-34151 CVE-2023-35827 CVE-2023-3745 CVE-2023-38408
CVE-2023-38469 CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175
CVE-2023-42465 CVE-2023-45322 CVE-2023-46343 CVE-2023-46838 CVE-2023-47233
CVE-2023-4750 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 CVE-2023-48234
CVE-2023-48235 CVE-2023-48236 CVE-2023-48237 CVE-2023-48706 CVE-2023-48795
CVE-2023-51042 CVE-2023-51043 CVE-2023-51385 CVE-2023-51780 CVE-2023-51782
CVE-2023-52340 CVE-2023-52356 CVE-2023-52429 CVE-2023-52443 CVE-2023-52445
CVE-2023-52449 CVE-2023-52451 CVE-2023-52464 CVE-2023-52475 CVE-2023-52478
CVE-2023-52482 CVE-2023-52502 CVE-2023-52530 CVE-2023-52531 CVE-2023-52532
CVE-2023-52574 CVE-2023-52597 CVE-2023-52605 CVE-2023-5341 CVE-2023-5388
CVE-2023-5752 CVE-2023-6004 CVE-2023-6040 CVE-2023-6356 CVE-2023-6535
CVE-2023-6536 CVE-2023-6597 CVE-2023-6918 CVE-2024-0340 CVE-2024-0607
CVE-2024-0727 CVE-2024-0775 CVE-2024-0985 CVE-2024-1086 CVE-2024-1151
CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20922 CVE-2024-20923
CVE-2024-20925 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952 CVE-2024-22667
CVE-2024-23849 CVE-2024-23851 CVE-2024-25062 CVE-2024-26585 CVE-2024-26595
--- --- --- --- ---
CVE-2024-26600 CVE-2024-26622

SUSE Linux Enterprise Server 12 SP5 CVE list for an Avamar combined proxy
The CVEs in this section apply to SLES 12 SP5 on an Avamar combined proxy.
Table 4. 2024R1 CVEs for SLES 12 SP5 on an Avamar combined proxy

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-48627 CVE-2023-1667 CVE-2023-22655 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-38575 CVE-2023-39368 CVE-2023-40217 CVE-2023-40745
CVE-2023-41175 CVE-2023-43490 CVE-2023-46343 CVE-2023-46838 CVE-2023-47233
CVE-2023-4750 CVE-2023-48231 CVE-2023-48232 CVE-2023-48233 CVE-2023-48234
CVE-2023-48235 CVE-2023-48236 CVE-2023-48237 CVE-2023-48706 CVE-2023-48795
CVE-2023-51042 CVE-2023-51043 CVE-2023-51385 CVE-2023-51780 CVE-2023-51782
CVE-2023-52340 CVE-2023-52356 CVE-2023-52429 CVE-2023-52443 CVE-2023-52445
CVE-2023-52449 CVE-2023-52451 CVE-2023-52464 CVE-2023-52475 CVE-2023-52478
CVE-2023-52482 CVE-2023-52502 CVE-2023-52530 CVE-2023-52531 CVE-2023-52532
CVE-2023-52574 CVE-2023-52597 CVE-2023-52605 CVE-2023-5752 CVE-2023-6004
CVE-2023-6040 CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597
CVE-2023-6918 CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775
CVE-2024-1086 CVE-2024-1151 CVE-2024-20918 CVE-2024-20919 CVE-2024-20921
CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926 CVE-2024-20945
CVE-2024-20952 CVE-2024-22667 CVE-2024-23849 CVE-2024-23851 CVE-2024-25062
CVE-2024-26585 CVE-2024-26595 CVE-2024-26600 CVE-2024-26622

SUSE Linux Enterprise Server 12 SP5 CVE list for an NVE
The CVEs in this section apply to SLES 12 SP5 on an NVE.

Table 5. 2024R1 CVEs for SLES 12 SP5 on an NVE

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-4806 CVE-2022-48627 CVE-2023-1667 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175 CVE-2023-42465
CVE-2023-46343 CVE-2023-46838 CVE-2023-47233 CVE-2023-4750 CVE-2023-48231
CVE-2023-48232 CVE-2023-48233 CVE-2023-48234 CVE-2023-48235 CVE-2023-48236
CVE-2023-48237 CVE-2023-48706 CVE-2023-48795 CVE-2023-51042 CVE-2023-51043
CVE-2023-51385 CVE-2023-51780 CVE-2023-51782 CVE-2023-52340 CVE-2023-52356
CVE-2023-52429 CVE-2023-52443 CVE-2023-52445 CVE-2023-52449 CVE-2023-52451
CVE-2023-52464 CVE-2023-52475 CVE-2023-52478 CVE-2023-52482 CVE-2023-52502
CVE-2023-52530 CVE-2023-52531 CVE-2023-52532 CVE-2023-52574 CVE-2023-52597
CVE-2023-52605 CVE-2023-5388 CVE-2023-5752 CVE-2023-6004 CVE-2023-6040
CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597 CVE-2023-6918
CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775 CVE-2024-1086
CVE-2024-1151 CVE-2024-20918 CVE-2024-20919 CVE-2024-20921 CVE-2024-20922
CVE-2024-20923 CVE-2024-20925 CVE-2024-20926 CVE-2024-20945 CVE-2024-20952
CVE-2024-22667 CVE-2024-23849 CVE-2024-23851 CVE-2024-25062 CVE-2024-26585
CVE-2024-26595 CVE-2024-26600 CVE-2024-26622

SUSE Linux Enterprise Server 12 SP5 CVE list for an NDMP accelerator node
The CVEs in this section apply to SLES 12 SP5 on an NDMP accelerator node.
Table 6. 2024R1 CVEs for SLES 12 SP5 on an NDMP accelerator node

CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2013-0176 CVE-2014-0017
CVE-2014-8132 CVE-2015-3146 CVE-2015-8325 CVE-2015-8668 CVE-2016-0739
CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010 CVE-2016-10011
CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858 CVE-2017-5849
CVE-2018-10933 CVE-2018-20685 CVE-2019-14889 CVE-2019-25162 CVE-2019-6109
CVE-2019-6110 CVE-2019-6111 CVE-2020-16135 CVE-2020-1730 CVE-2020-36773
--- --- --- --- ---
CVE-2020-36777 CVE-2020-36784 CVE-2021-28041 CVE-2021-33631 CVE-2021-3634
CVE-2021-41617 CVE-2021-46906 CVE-2021-46915 CVE-2021-46921 CVE-2021-46924
CVE-2021-46929 CVE-2021-46932 CVE-2021-46953 CVE-2021-46974 CVE-2021-46991
CVE-2021-46992 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47077
CVE-2021-47078 CVE-2022-4806 CVE-2022-48627 CVE-2023-1667 CVE-2023-2283
CVE-2023-27043 CVE-2023-28746 CVE-2023-35827 CVE-2023-38408 CVE-2023-38469
CVE-2023-38471 CVE-2023-40217 CVE-2023-40745 CVE-2023-41175 CVE-2023-42465
CVE-2023-46343 CVE-2023-46838 CVE-2023-47233 CVE-2023-4750 CVE-2023-48231
CVE-2023-48232 CVE-2023-48233 CVE-2023-48234 CVE-2023-48235 CVE-2023-48236
CVE-2023-48237 CVE-2023-48706 CVE-2023-48795 CVE-2023-51042 CVE-2023-51043
CVE-2023-51385 CVE-2023-51780 CVE-2023-51782 CVE-2023-52340 CVE-2023-52356
CVE-2023-52429 CVE-2023-52443 CVE-2023-52445 CVE-2023-52449 CVE-2023-52451
CVE-2023-52464 CVE-2023-52475 CVE-2023-52478 CVE-2023-52482 CVE-2023-52502
CVE-2023-52530 CVE-2023-52531 CVE-2023-52532 CVE-2023-52574 CVE-2023-52597
CVE-2023-52605 CVE-2023-5388 CVE-2023-5752 CVE-2023-6004 CVE-2023-6040
CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6597 CVE-2023-6918
CVE-2024-0340 CVE-2024-0607 CVE-2024-0727 CVE-2024-0775 CVE-2024-0985
CVE-2024-1086 CVE-2024-1151 CVE-2024-1441 CVE-2024-20918 CVE-2024-20919
CVE-2024-20921 CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926
CVE-2024-20945 CVE-2024-20952 CVE-2024-22667 CVE-2024-23849 CVE-2024-23851
CVE-2024-2496 CVE-2024-25062 CVE-2024-26585 CVE-2024-26595 CVE-2024-26600
CVE-2024-26622

SUSE Linux Enterprise Server 12 SP5 CVE list for an ADS Gen5A NDMP accelerator node
The CVEs in this section apply to SLES 12 SP5 on an ADS Gen5A NDMP accelerator node.
Table 7. 2024R1 CVEs for SLES 12 SP5 on an ADS Gen5A NDMP accelerator node

CVE-2015-8325 CVE-2016-0777 CVE-2016-0778 CVE-2016-10009 CVE-2016-10010
CVE-2016-10011 CVE-2016-10012 CVE-2016-6210 CVE-2016-6515 CVE-2016-8858
CVE-2018-20685 CVE-2019-6109 CVE-2019-6110 CVE-2019-6111 CVE-2020-26555
CVE-2021-28041 CVE-2021-33631 CVE-2021-41617 CVE-2022-2586 CVE-2023-0461
CVE-2023-31083 CVE-2023-38408 CVE-2023-39197 CVE-2023-39198 CVE-2023-45863
CVE-2023-45871 CVE-2023-46838 CVE-2023-47233 CVE-2023-48795 CVE-2023-51042
CVE-2023-51043 CVE-2023-51385 CVE-2023-51779 CVE-2023-51780 CVE-2023-51782
CVE-2023-5717 CVE-2023-6040 CVE-2023-6121 CVE-2023-6356 CVE-2023-6535
CVE-2023-6536 CVE-2023-6606 CVE-2023-6610 CVE-2023-6931 CVE-2023-6932
CVE-2024-0340 CVE-2024-0775 CVE-2024-1086 CVE-2024-20918 CVE-2024-20919
--- --- --- --- ---
CVE-2024-20921 CVE-2024-20922 CVE-2024-20923 CVE-2024-20925 CVE-2024-20926
CVE-2024-20945 CVE-2024-20952

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2017 – 2024 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

DELLTechnologies User Manuals

Related Manuals