DELL Technologies 2023R3 Avamar Platform OS Security Patch Rollup User Guide
- August 16, 2024
- DELL Technologies
Table of Contents
DELL Technologies 2023R3 Avamar Platform OS Security Patch Rollup
Specifications
- Product Name: Dell Avamar Platform OS Security Patch Rollup
- Version: 2023R3
- Manufacturer: Dell Inc.
- Supported Products:
- Avamar server
- Avamar combined proxy
- Avamar Virtual Edition (AVE)
- Avamar Data Store (ADS)
- Avamar NDMP accelerator node
- NetWorker Virtual Edition (NVE)
- PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)
- Third-Party Components Updated:
- Java Runtime Environment (JRE)
- Apache Tomcat
- BSAFE OwB FIPS package
Revision history
The following table presents the revision history of this document. Table 1. Revision history
Table 1. Revision history
Revision | Date | Description |
---|---|---|
01 | October, 2023 | First release of this document for 2023R3. |
Avamar platform OS security patch rollup
The Avamar platform OS security patch rollup automates the steps that are
required to apply security and operating system updates that are periodically
released between scheduled Avamar server software releases.
These release notes provide lists of the common vulnerabilities and exposures
(CVEs) addressed by each security patch.
The security patches that are listed in this document apply to the following products:
- Avamar server
- Avamar combined proxy
- Avamar Virtual Edition (AVE)
- Avamar Data Store (ADS)
- Avamar NDMP accelerator node
- NetWorker Virtual Edition (NVE)
- PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)
The latest Dell Security Advisory (DSA) KB article for these products on the
Support site provides the support matrix.
This Avamar platform OS security patch rollup updates the following third-
party components also, if present:
- Java Runtime Environment (JRE)
- Apache Tomcat
- BSAFE OwB FIPS package
Clean /boot volume
If required, perform this procedure to free space on the server’s /boot volume
when you apply the OS security patch rollup on ADS.
About this task
NOTE : To ensure all the nodes in a multi-node server have the required
free space on the /boot volume, perform this procedure on utility node, all
storage nodes, spare nodes, and accelerator nodes (if applicable).
NOTE: When you manually apply the Security Rollup, the required amount of
free space on the /boot volume is 80MB.
When you apply rollup via avinstaller, the required amount of free space on
the /boot volume differs between rollup releases. The following table
determines how much free space the rollup requires. Compare this value to the
observed free space. When
the rollup is applied manually, the required amount of free space on the /boot
volume is 80MB for every release.
Table 2. Free space targets
Rollup version | Free space target |
---|---|
2022R1 and later | NA |
Steps
-
Open a command shell and log in by using one of the following methods:
-
For a single-node server, log in to the server as admin, and then switch user to root by running su -.
-
For a multi-node server, log in to the utility node as admin, and then switch user to root by running su -.
-
Check the size and free space on the /boot volume by typing the following command:
df -h /boot/ -
Filesystem Size Used Avail Use% Mounted on
-
/dev/sda1 98M 13M 81M 14% /boot
Verify whether the volume meets the free space target for this rollup version. -
Check for -kdump files on the /boot volume by typing the following command:
ls -l /boot/kdump
Information similar to the following is displayed in the command shell: -
– rw-r–r– 1 root root 10517730 Aug 1 13:14 /boot/vmlinux-KERNEL_VERSION-kdump
-
Remove kdump files on the/boot volume by typing the following command:
rm /boot/*kdump -
List the installed kernels by typing the following command:
rpm -qa |grep kernel-default -
kernel-default-base-VERSION_NEW
-
kernel-default-base-VERSION_OLD
-
kernel-default-VERSION_NEW
-
kernel-default-VERSION_OLD
-
Display the running kernel version by typing the following command:
uname -a
Linux test VERSION_NEW #1 SMP Thu Aug 1 15:34:33 UTC 2019 (47e48a4) x86_64 x86_64 x86_64 GNU/Linux -
Identify any old kernels from the list of installed kernels. Exclude the running kernel version.
-
If present, remove any old kernels by typing the following command on one line:
rpm -ev kernel-default-VERSION_OLD kernel-default-base-VERSION_OLD -
Check the installed and running kernel again for any old kernel files in /boot. If present, remove them manually.
-
Check for archived .gz files on the /boot volume by typing the following command:
ls -l /boot/*.gz- – rw-r–r– 1 root root 357826 Oct 31 2018 /boot/symvers-VERSION_OLD-default.gz
- – rw-r–r– 1 root root 358659 Aug 1 13:14 /boot/symvers-VERSION_NEW-default.gz
- – rw-r–r– 1 root root 10501442 Oct 31 2018 /boot/vmlinux-VERSION_OLD-default.gz
- – rw-r–r– 1 root root 10517730 Aug 1 13:14 /boot/vmlinux-VERSION_NEW-default.gz
-
If necessary, remove any archived .gz files on the /boot volume by typing the following command:
rm /boot/*.gz -
If the space on the /boot volume is still not enough(less than 80MB)(for manual installation), backup and remove the running kernel:
mkdir /usr/local/avamar/var/rollup_bak
mv /boot/VERSION_NEW
/usr/local/avamar/var/rollup_bak
NOTE: After the security rollup installation is complete, do not forget to restore the running kernel files by following step 14. -
Check the size and free space on the /boot volume by typing the following command: df -h /boot/
-
For manual installation, after rollup installation is complete, restore the running kernel (if back up done in step 12) by typing the following command:
-
mv /usr/local/avamar/var/rollup_bak/*-default /boot
-
rm -r /usr/local/avamar/var/rollup_bak
2023R3 CVEs
This release contains patches for the following CVEs, as indicated by
platform. See the spreadsheet included with each release for CVE details,
including applicable packages and RPM files.
SUSE Linux Enterprise Server 12 SP5 CVE list for an Avamar server
The CVEs in this section apply to SLES 12 SP5 on an Avamar server.
Table 3. 2023R3 CVEs for SLES 12 SP5 on an Avamar server
CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 |
---|---|---|---|
CVE-2012-4929 | CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 |
CVE-2013-1739 | CVE-2013-1740 | CVE-2013-5605 | CVE-2014-1492 |
CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 | CVE-2014-4877 |
CVE-2014-5044 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 |
CVE-2015-4000 | CVE-2015-5276 | CVE-2015-7181 | CVE-2015-7182 |
CVE-2015-7183 | CVE-2015-7575 | CVE-2015-8985 | CVE-2016-1938 |
CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 |
CVE-2016-4971 | CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 |
CVE-2016-8635 | CVE-2016-9074 | CVE-2016-9574 | CVE-2017-1000251 |
CVE-2017-1000252 | CVE-2017-1000255 | CVE-2017-1000410 | CVE-2017-10989 |
CVE-2017-11473 | CVE-2017-11600 | CVE-2017-11671 | CVE-2017-12153 |
CVE-2017-12154 | CVE-2017-12190 | CVE-2017-12193 | CVE-2017-13080 |
CVE-2017-13089 | CVE-2017-13090 | CVE-2017-13166 | CVE-2017-13695 |
CVE-2017-14051 | CVE-2017-14489 | CVE-2017-15115 | CVE-2017-15127 |
CVE-2017-15128 | CVE-2017-15129 | CVE-2017-15265 | CVE-2017-15537 |
CVE-2017-15649 | CVE-2017-15951 | CVE-2017-16525 | CVE-2017-16527 |
CVE-2017-16528 | CVE-2017-16529 | CVE-2017-16531 | CVE-2017-16533 |
CVE-2017-16534 | CVE-2017-16535 | CVE-2017-16536 | CVE-2017-16537 |
CVE-2017-16538 | CVE-2017-16644 | CVE-2017-16645 | CVE-2017-16646 |
CVE-2017-16647 | CVE-2017-16649 | CVE-2017-16650 | CVE-2017-16911 |
CVE-2017-16912 | CVE-2017-16913 | CVE-2017-16914 | CVE-2017-16939 |
CVE-2017-16994 | CVE-2017-16995 | CVE-2017-16996 | CVE-2017-17052 |
CVE-2017-17448 | CVE-2017-17449 | CVE-2017-17450 | CVE-2017-17558 |
CVE-2017-17712 | CVE-2017-17741 | CVE-2017-17805 | CVE-2017-17806 |
CVE-2017-17852 | CVE-2017-17853 | CVE-2017-17854 | CVE-2017-17855 |
CVE-2017-17856 | CVE-2017-17857 | CVE-2017-17862 | CVE-2017-17864 |
CVE-2017-17975 | CVE-2017-18075 | CVE-2017-18202 | CVE-2017-18203 |
CVE-2017-18204 | CVE-2017-18208 | CVE-2017-18224 | CVE-2017-18344 |
CVE-2017-18551 | CVE-2017-18595 | CVE-2017-2518 | CVE-2017-5715 |
CVE-2017-5753 | CVE-2017-5754 | CVE-2017-6508 | CVE-2017-7541 |
CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 |
--- | --- | --- | --- |
CVE-2012-4929 | CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 |
CVE-2013-1739 | CVE-2013-1740 | CVE-2013-5605 | CVE-2014-1492 |
CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 | CVE-2014-4877 |
CVE-2014-5044 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 |
CVE-2015-4000 | CVE-2015-5276 | CVE-2015-7181 | CVE-2015-7182 |
CVE-2015-7183 | CVE-2015-7575 | CVE-2015-8985 | CVE-2016-1938 |
CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 |
CVE-2016-4971 | CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 |
CVE-2016-8635 | CVE-2016-9074 | CVE-2016-9574 | CVE-2017-1000251 |
CVE-2017-1000252 | CVE-2017-1000255 | CVE-2017-1000410 | CVE-2017-10989 |
CVE-2017-11473 | CVE-2017-11600 | CVE-2017-11671 | CVE-2017-12153 |
CVE-2017-12154 | CVE-2017-12190 | CVE-2017-12193 | CVE-2017-13080 |
CVE-2017-13089 | CVE-2017-13090 | CVE-2017-13166 | CVE-2017-13695 |
CVE-2017-14051 | CVE-2017-14489 | CVE-2017-15115 | CVE-2017-15127 |
CVE-2017-15128 | CVE-2017-15129 | CVE-2017-15265 | CVE-2017-15537 |
CVE-2017-15649 | CVE-2017-15951 | CVE-2017-16525 | CVE-2017-16527 |
CVE-2017-16528 | CVE-2017-16529 | CVE-2017-16531 | CVE-2017-16533 |
CVE-2017-16534 | CVE-2017-16535 | CVE-2017-16536 | CVE-2017-16537 |
CVE-2017-16538 | CVE-2017-16644 | CVE-2017-16645 | CVE-2017-16646 |
CVE-2017-16647 | CVE-2017-16649 | CVE-2017-16650 | CVE-2017-16911 |
CVE-2017-16912 | CVE-2017-16913 | CVE-2017-16914 | CVE-2017-16939 |
CVE-2017-16994 | CVE-2017-16995 | CVE-2017-16996 | CVE-2017-17052 |
CVE-2017-17448 | CVE-2017-17449 | CVE-2017-17450 | CVE-2017-17558 |
CVE-2017-17712 | CVE-2017-17741 | CVE-2017-17805 | CVE-2017-17806 |
CVE-2017-17852 | CVE-2017-17853 | CVE-2017-17854 | CVE-2017-17855 |
CVE-2017-17856 | CVE-2017-17857 | CVE-2017-17862 | CVE-2017-17864 |
CVE-2017-17975 | CVE-2017-18075 | CVE-2017-18202 | CVE-2017-18203 |
CVE-2017-18204 | CVE-2017-18208 | CVE-2017-18224 | CVE-2017-18344 |
CVE-2017-18551 | CVE-2017-18595 | CVE-2017-2518 | CVE-2017-5715 |
CVE-2017-5753 | CVE-2017-5754 | CVE-2017-6508 | CVE-2017-7541 |
CVE-2019-15126 | CVE-2019-15211 | CVE-2019-15212 | CVE-2019-15213 |
--- | --- | --- | --- |
CVE-2019-15214 | CVE-2019-15215 | CVE-2019-15216 | CVE-2019-15217 |
CVE-2019-15218 | CVE-2019-15219 | CVE-2019-15220 | CVE-2019-15221 |
CVE-2019-15222 | CVE-2019-15239 | CVE-2019-15290 | CVE-2019-15291 |
CVE-2019-15292 | CVE-2019-15538 | CVE-2019-15666 | CVE-2019-15902 |
CVE-2019-15916 | CVE-2019-15917 | CVE-2019-15919 | CVE-2019-15920 |
CVE-2019-15921 | CVE-2019-15924 | CVE-2019-15926 | CVE-2019-15927 |
CVE-2019-16168 | CVE-2019-16231 | CVE-2019-16232 | CVE-2019-16233 |
CVE-2019-16234 | CVE-2019-16746 | CVE-2019-16994 | CVE-2019-16995 |
CVE-2019-17006 | CVE-2019-17055 | CVE-2019-17056 | CVE-2019-17133 |
CVE-2019-17666 | CVE-2019-18660 | CVE-2019-18683 | CVE-2019-18805 |
CVE-2019-18808 | CVE-2019-18809 | CVE-2019-19036 | CVE-2019-19045 |
CVE-2019-19046 | CVE-2019-19049 | CVE-2019-19051 | CVE-2019-19052 |
CVE-2019-19054 | CVE-2019-19056 | CVE-2019-19057 | CVE-2019-19058 |
CVE-2019-19060 | CVE-2019-19062 | CVE-2019-19063 | CVE-2019-19065 |
CVE-2019-19066 | CVE-2019-19067 | CVE-2019-19068 | CVE-2019-19073 |
CVE-2019-19074 | CVE-2019-19075 | CVE-2019-19077 | CVE-2019-19078 |
CVE-2019-19080 | CVE-2019-19081 | CVE-2019-19082 | CVE-2019-19083 |
CVE-2019-19227 | CVE-2019-19244 | CVE-2019-19317 | CVE-2019-19318 |
CVE-2019-19319 | CVE-2019-19332 | CVE-2019-19338 | CVE-2019-19377 |
CVE-2019-19447 | CVE-2019-19462 | CVE-2019-19523 | CVE-2019-19524 |
CVE-2019-19525 | CVE-2019-19526 | CVE-2019-19527 | CVE-2019-19528 |
CVE-2019-19529 | CVE-2019-19530 | CVE-2019-19531 | CVE-2019-19532 |
CVE-2019-19533 | CVE-2019-19534 | CVE-2019-19535 | CVE-2019-19536 |
CVE-2019-19537 | CVE-2019-19543 | CVE-2019-19603 | CVE-2019-19645 |
CVE-2019-19646 | CVE-2019-19767 | CVE-2019-19768 | CVE-2019-19770 |
CVE-2019-19880 | CVE-2019-19923 | CVE-2019-19924 | CVE-2019-19925 |
CVE-2019-19926 | CVE-2019-19927 | CVE-2019-19959 | CVE-2019-19965 |
CVE-2019-19966 | CVE-2019-20054 | CVE-2019-20095 | CVE-2019-20096 |
CVE-2019-20218 | CVE-2019-2024 | CVE-2019-20806 | CVE-2019-20810 |
CVE-2019-20811 | CVE-2019-20812 | CVE-2019-20908 | CVE-2019-20934 |
CVE-2019-25045 | CVE-2019-3459 | CVE-2019-3460 | CVE-2019-3560 |
CVE-2019-3701 | CVE-2019-3819 | CVE-2019-3846 | CVE-2019-3874 |
CVE-2019-3882 | CVE-2019-3900 | CVE-2019-5489 | CVE-2019-5953 |
CVE-2019-6974 | CVE-2019-7221 | CVE-2019-7222 | CVE-2019-7308 |
CVE-2019-8457 | CVE-2019-8564 | CVE-2019-8912 | CVE-2019-8980 |
CVE-2019-9003 | CVE-2019-9213 | CVE-2019-9455 | CVE-2019-9456 |
CVE-2019-9458 | CVE-2019-9500 | CVE-2019-9503 | CVE-2019-9506 |
CVE-2020-0305 | CVE-2020-0404 | CVE-2020-0427 | CVE-2020-0429 |
--- | --- | --- | --- |
CVE-2020-0430 | CVE-2020-0431 | CVE-2020-0432 | CVE-2020-0433 |
CVE-2020-0444 | CVE-2020-0465 | CVE-2020-0466 | CVE-2020-0543 |
CVE-2020-10135 | CVE-2020-10690 | CVE-2020-10711 | CVE-2020-10720 |
CVE-2020-10732 | CVE-2020-10751 | CVE-2020-10757 | CVE-2020-10766 |
CVE-2020-10767 | CVE-2020-10768 | CVE-2020-10769 | CVE-2020-10773 |
CVE-2020-10781 | CVE-2020-10942 | CVE-2020-11494 | CVE-2020-11608 |
CVE-2020-11609 | CVE-2020-11668 | CVE-2020-11669 | CVE-2020-12114 |
CVE-2020-12351 | CVE-2020-12352 | CVE-2020-12399 | CVE-2020-12400 |
CVE-2020-12401 | CVE-2020-12402 | CVE-2020-12403 | CVE-2020-12464 |
CVE-2020-12652 | CVE-2020-12653 | CVE-2020-12654 | CVE-2020-12655 |
CVE-2020-12656 | CVE-2020-12657 | CVE-2020-12659 | CVE-2020-12769 |
CVE-2020-12770 | CVE-2020-12771 | CVE-2020-12888 | CVE-2020-13143 |
CVE-2020-13434 | CVE-2020-13435 | CVE-2020-13630 | CVE-2020-13631 |
CVE-2020-13632 | CVE-2020-13974 | CVE-2020-14314 | CVE-2020-14331 |
CVE-2020-14351 | CVE-2020-14356 | CVE-2020-14381 | CVE-2020-14386 |
CVE-2020-14390 | CVE-2020-14416 | CVE-2020-15358 | CVE-2020-15393 |
CVE-2020-15436 | CVE-2020-15437 | CVE-2020-15780 | CVE-2020-16120 |
CVE-2020-16166 | CVE-2020-16305 | CVE-2020-1749 | CVE-2020-24394 |
CVE-2020-24586 | CVE-2020-24587 | CVE-2020-24588 | CVE-2020-2521 |
CVE-2020-25211 | CVE-2020-25212 | CVE-2020-25284 | CVE-2020-25285 |
CVE-2020-25639 | CVE-2020-25641 | CVE-2020-25643 | CVE-2020-25645 |
CVE-2020-25648 | CVE-2020-25656 | CVE-2020-25668 | CVE-2020-25669 |
CVE-2020-25670 | CVE-2020-25671 | CVE-2020-25672 | CVE-2020-25673 |
CVE-2020-25704 | CVE-2020-25705 | CVE-2020-26088 | CVE-2020-26139 |
CVE-2020-26141 | CVE-2020-26145 | CVE-2020-26147 | CVE-2020-26541 |
CVE-2020-26558 | CVE-2020-27068 | CVE-2020-27170 | CVE-2020-27171 |
CVE-2020-2732 | CVE-2020-27673 | CVE-2020-27675 | CVE-2020-27777 |
CVE-2020-27786 | CVE-2020-27815 | CVE-2020-27820 | CVE-2020-27825 |
CVE-2020-27835 | CVE-2020-28097 | CVE-2020-28374 | CVE-2020-28915 |
CVE-2020-28974 | CVE-2020-29368 | CVE-2020-29371 | CVE-2020-29568 |
CVE-2020-29569 | CVE-2020-29660 | CVE-2020-29661 | CVE-2020-35519 |
CVE-2020-36158 | CVE-2020-36310 | CVE-2020-36311 | CVE-2020-36312 |
CVE-2020-36322 | CVE-2020-36385 | CVE-2020-36386 | CVE-2020-36516 |
CVE-2020-36557 | CVE-2020-36558 | CVE-2020-36691 | CVE-2020-3702 |
CVE-2020-4788 | CVE-2020-6829 | CVE-2020-7053 | CVE-2020-8428 |
CVE-2020-8647 | CVE-2020-8648 | CVE-2020-8649 | CVE-2020-8694 |
CVE-2020-8834 | CVE-2020-8992 | CVE-2020-9327 | CVE-2020-9383 |
CVE-2021-0129 | CVE-2021-0342 | CVE-2021-0512 | CVE-2021-0605 |
--- | --- | --- | --- |
CVE-2021-0920 | CVE-2021-0935 | CVE-2021-0941 | CVE-2021-20177 |
CVE-2021-20219 | CVE-2021-20292 | CVE-2021-20321 | CVE-2021-20322 |
CVE-2021-22543 | CVE-2021-22555 | CVE-2021-23133 | CVE-2021-23134 |
CVE-2021-26341 | CVE-2021-26930 | CVE-2021-26931 | CVE-2021-26932 |
CVE-2021-27363 | CVE-2021-27364 | CVE-2021-27365 | CVE-2021-28038 |
CVE-2021-28660 | CVE-2021-28688 | CVE-2021-28711 | CVE-2021-28712 |
CVE-2021-28713 | CVE-2021-28714 | CVE-2021-28715 | CVE-2021-28950 |
CVE-2021-28964 | CVE-2021-28971 | CVE-2021-28972 | CVE-2021-29154 |
CVE-2021-29155 | CVE-2021-29264 | CVE-2021-29265 | CVE-2021-29647 |
CVE-2021-29650 | CVE-2021-30002 | CVE-2021-31916 | CVE-2021-32399 |
CVE-2021-33033 | CVE-2021-33034 | CVE-2021-33061 | CVE-2021-33098 |
CVE-2021-33200 | CVE-2021-3347 | CVE-2021-3348 | CVE-2021-33624 |
CVE-2021-33655 | CVE-2021-33656 | CVE-2021-33909 | CVE-2021-3428 |
CVE-2021-3444 | CVE-2021-34556 | CVE-2021-34693 | CVE-2021-3483 |
CVE-2021-3491 | CVE-2021-34981 | CVE-2021-3542 | CVE-2021-35477 |
CVE-2021-3564 | CVE-2021-3609 | CVE-2021-3612 | CVE-2021-3640 |
CVE-2021-3653 | CVE-2021-3655 | CVE-2021-3656 | CVE-2021-3659 |
CVE-2021-36690 | CVE-2021-3679 | CVE-2021-3715 | CVE-2021-37159 |
CVE-2021-3732 | CVE-2021-3744 | CVE-2021-3752 | CVE-2021-3753 |
CVE-2021-37576 | CVE-2021-3759 | CVE-2021-3760 | CVE-2021-3764 |
CVE-2021-3772 | CVE-2021-38160 | CVE-2021-38198 | CVE-2021-38204 |
CVE-2021-38208 | CVE-2021-3923 | CVE-2021-39648 | CVE-2021-39657 |
CVE-2021-39711 | CVE-2021-39713 | CVE-2021-4002 | CVE-2021-4037 |
CVE-2021-40490 | CVE-2021-4083 | CVE-2021-4135 | CVE-2021-4149 |
CVE-2021-4157 | CVE-2021-41864 | CVE-2021-4197 | CVE-2021-42008 |
CVE-2021-4202 | CVE-2021-4203 | CVE-2021-42252 | CVE-2021-42739 |
CVE-2021-43389 | CVE-2021-43527 | CVE-2021-43975 | CVE-2021-43976 |
CVE-2021-44733 | CVE-2021-44879 | CVE-2021-45095 | CVE-2021-45485 |
CVE-2021-45486 | CVE-2021-45868 | CVE-2022-0001 | CVE-2022-0002 |
CVE-2022-0322 | CVE-2022-0330 | CVE-2022-0435 | CVE-2022-0487 |
CVE-2022-0492 | CVE-2022-0617 | CVE-2022-0644 | CVE-2022-0812 |
CVE-2022-0847 | CVE-2022-0850 | CVE-2022-0886 | CVE-2022-1011 |
CVE-2022-1012 | CVE-2022-1016 | CVE-2022-1048 | CVE-2022-1097 |
CVE-2022-1184 | CVE-2022-1280 | CVE-2022-1353 | CVE-2022-1419 |
CVE-2022-1462 | CVE-2022-1516 | CVE-2022-1652 | CVE-2022-1679 |
CVE-2022-1729 | CVE-2022-1734 | CVE-2022-1836 | CVE-2022-1974 |
CVE-2022-1975 | CVE-2022-20008 | CVE-2022-20132 | CVE-2022-20141 |
CVE-2022-20154 | CVE-2022-20166 | CVE-2022-20368 | CVE-2022-20369 |
--- | --- | --- | --- |
CVE-2022-20567 | CVE-2022-21123 | CVE-2022-21125 | CVE-2022-21127 |
CVE-2022-21166 | CVE-2022-21180 | CVE-2022-2127 | CVE-2022-21385 |
CVE-2022-21499 | CVE-2022-2153 | CVE-2022-22942 | CVE-2022-23036 |
CVE-2022-23037 | CVE-2022-23038 | CVE-2022-23039 | CVE-2022-23040 |
CVE-2022-23041 | CVE-2022-23042 | CVE-2022-2318 | CVE-2022-23491 |
CVE-2022-23960 | CVE-2022-24448 | CVE-2022-24959 | CVE-2022-2503 |
CVE-2022-2588 | CVE-2022-26365 | CVE-2022-26373 | CVE-2022-2639 |
CVE-2022-26490 | CVE-2022-2663 | CVE-2022-26966 | CVE-2022-28356 |
CVE-2022-28388 | CVE-2022-28389 | CVE-2022-28390 | CVE-2022-28693 |
CVE-2022-28748 | CVE-2022-29581 | CVE-2022-2964 | CVE-2022-2977 |
CVE-2022-29900 | CVE-2022-29901 | CVE-2022-2991 | CVE-2022-3028 |
CVE-2022-30594 | CVE-2022-3107 | CVE-2022-3108 | CVE-2022-3169 |
CVE-2022-32296 | CVE-2022-3239 | CVE-2022-3303 | CVE-2022-33740 |
CVE-2022-33741 | CVE-2022-33742 | CVE-2022-33981 | CVE-2022-3424 |
CVE-2022-3479 | CVE-2022-3521 | CVE-2022-3524 | CVE-2022-3542 |
CVE-2022-3545 | CVE-2022-3564 | CVE-2022-3565 | CVE-2022-3566 |
CVE-2022-3567 | CVE-2022-35737 | CVE-2022-3586 | CVE-2022-3594 |
CVE-2022-3621 | CVE-2022-3628 | CVE-2022-36280 | CVE-2022-3629 |
CVE-2022-3635 | CVE-2022-3643 | CVE-2022-3646 | CVE-2022-3649 |
CVE-2022-36879 | CVE-2022-36946 | CVE-2022-38096 | CVE-2022-3903 |
CVE-2022-39188 | CVE-2022-40307 | CVE-2022-40768 | CVE-2022-4095 |
CVE-2022-40982 | CVE-2022-41218 | CVE-2022-4129 | CVE-2022-41848 |
CVE-2022-41850 | CVE-2022-41858 | CVE-2022-42328 | CVE-2022-42329 |
CVE-2022-42703 | CVE-2022-42895 | CVE-2022-42896 | CVE-2022-43750 |
CVE-2022-4378 | CVE-2022-43945 | CVE-2022-45884 | CVE-2022-45885 |
CVE-2022-45886 | CVE-2022-45887 | CVE-2022-45919 | CVE-2022-45934 |
CVE-2022-4662 | CVE-2022-46908 | CVE-2022-47929 | CVE-2023-0045 |
CVE-2023-0266 | CVE-2023-0459 | CVE-2023-0590 | CVE-2023-0597 |
CVE-2023-0767 | CVE-2023-1076 | CVE-2023-1077 | CVE-2023-1079 |
CVE-2023-1095 | CVE-2023-1118 | CVE-2023-1249 | CVE-2023-1264 |
CVE-2023-1281 | CVE-2023-1355 | CVE-2023-1380 | CVE-2023-1390 |
CVE-2023-1513 | CVE-2023-1611 | CVE-2023-1637 | CVE-2023-1670 |
CVE-2023-1855 | CVE-2023-1989 | CVE-2023-1990 | CVE-2023-1998 |
CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 | CVE-2023-2124 |
CVE-2023-2162 | CVE-2023-2176 | CVE-2023-2194 | CVE-2023-22043 |
CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2269 | CVE-2023-23454 |
CVE-2023-23455 | CVE-2023-23559 | CVE-2023-2426 | CVE-2023-2483 |
CVE-2023-2513 | CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 |
--- | --- | --- | --- |
CVE-2023-26545 | CVE-2023-2828 | CVE-2023-28328 | CVE-2023-28464 |
CVE-2023-28466 | CVE-2023-28772 | CVE-2023-2985 | CVE-2023-30772 |
CVE-2023-3090 | CVE-2023-31084 | CVE-2023-3111 | CVE-2023-3141 |
CVE-2023-31436 | CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 |
CVE-2023-32001 | CVE-2023-32269 | CVE-2023-3268 | CVE-2023-3358 |
CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 |
CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 |
CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 |
CVE-2023-39417 | CVE-2023-39418 | CVE-2023-4016 | CVE-2023-4156 |
CVE-2016-5384 | CVE-2018-10906 | CVE-2014-9474 | CVE-2019-19977 |
CVE-2016-9427 | CVE-2017-1000112 | CVE-2014-7844 | CVE-2023-26604 |
CVE-2022-27404 | CVE-2017-10672 |
SUSE Linux Enterprise Server 12 SP5 CVE list for an Avamar combined proxy
The CVEs in this section apply to SLES 12 SP5 on an Avamar combined proxy.
Table 4. 2023R3 CVEs for SLES 12 SP5 on an Avamar combined proxy
CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
---|---|---|---|---|
CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
CVE-2019-5953 | CVE-2020-16305 | CVE-2022-2127 | CVE-2022-40982 | CVE-2022-41804 |
CVE-2023-0459 | CVE-2023-1077 | CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1264 |
CVE-2023-1355 | CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 |
CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 | CVE-2023-23908 | CVE-2023-2426 |
CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 | CVE-2023-2828 | CVE-2023-2985 |
CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 | CVE-2023-31484 | CVE-2023-3159 |
CVE-2023-3161 | CVE-2023-32001 | CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 |
CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 |
CVE-2023-3567 | CVE-2023-35824 | CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 |
CVE-2023-36664 | CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 |
CVE-2023-4016 | CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE list for an NVE
The CVEs in this section apply to SLES 12 SP5 on an NVE.
Table 5. 2023R3 CVEs for SLES 12 SP5 on an NVE
CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 | CVE-2012-4929 |
---|---|---|---|---|
CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 | CVE-2013-1739 | CVE-2013-1740 |
--- | --- | --- | --- | --- |
CVE-2013-5605 | CVE-2014-1492 | CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 |
CVE-2014-4877 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 | CVE-2015-4000 |
CVE-2015-7181 | CVE-2015-7182 | CVE-2015-7183 | CVE-2015-7575 | CVE-2016-1938 |
CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 | CVE-2016-4971 |
CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 | CVE-2016-8635 | CVE-2016-9074 |
CVE-2016-9574 | CVE-2017-10989 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-2518 |
CVE-2017-6508 | CVE-2017-7805 | CVE-2018-0494 | CVE-2018-0495 | CVE-2018-12384 |
CVE-2018-12404 | CVE-2018-18508 | CVE-2018-20346 | CVE-2018-8740 | CVE-2019-11745 |
CVE-2019-16168 | CVE-2019-17006 | CVE-2019-19244 | CVE-2019-19317 | CVE-2019-19603 |
CVE-2019-19645 | CVE-2019-19646 | CVE-2019-19880 | CVE-2019-19923 | CVE-2019-19924 |
CVE-2019-19925 | CVE-2019-19926 | CVE-2019-19959 | CVE-2019-20218 | CVE-2019-5953 |
CVE-2019-8457 | CVE-2020-12399 | CVE-2020-12400 | CVE-2020-12401 | CVE-2020-12402 |
CVE-2020-12403 | CVE-2020-13434 | CVE-2020-13435 | CVE-2020-13630 | CVE-2020-13631 |
CVE-2020-13632 | CVE-2020-15358 | CVE-2020-16305 | CVE-2020-25648 | CVE-2020-6829 |
CVE-2020-9327 | CVE-2021-36690 | CVE-2021-43527 | CVE-2022-1097 | CVE-2022-2127 |
CVE-2022-23491 | CVE-2022-3479 | CVE-2022-35737 | CVE-2022-40982 | CVE-2022-46908 |
CVE-2022-4904 | CVE-2023-0459 | CVE-2023-0767 | CVE-2023-1077 | CVE-2023-1079 |
CVE-2023-1249 | CVE-2023-1264 | CVE-2023-1355 | CVE-2023-1637 | CVE-2023-2002 |
CVE-2023-20569 | CVE-2023-20593 | CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 |
CVE-2023-2426 | CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 | CVE-2023-26112 |
CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 |
CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-32001 | CVE-2023-3268 |
CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 |
CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 | CVE-2023-36054 |
CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3776 | CVE-2023-3817 |
CVE-2023-38408 | CVE-2023-38559 | CVE-2023-4016 | CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE list for an NDMP accelerator node
The CVEs in this section apply to SLES 12 SP5 on an NDMP accelerator node.
Table 6. 2023R3 CVEs for SLES 12 SP5 on an NDMP accelerator node
CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
---|---|---|---|---|
CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
CVE-2019-5953 | CVE-2022-2127 | CVE-2022-40982 | CVE-2023-0459 | CVE-2023-1077 |
CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 |
CVE-2023-20593 | CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2603 |
CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 |
--- | --- | --- | --- | --- |
CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-3195 | CVE-2023-32001 |
CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 |
CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3745 |
CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-39417 | CVE-2023-39418 |
CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE list for an ADS Gen5A NDMP
accelerator node
The CVEs in this section apply to SLES 12 SP5 on an ADS Gen5A NDMP accelerator
node.
Table 7. 2023R3 CVEs for SLES 12 SP5 on an ADS Gen5A NDMP accelerator node
CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
---|---|---|---|---|
CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
CVE-2019-5953 | CVE-2020-16305 | CVE-2022-2127 | CVE-2022-40982 | CVE-2023-0459 |
CVE-2023-1077 | CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1264 | CVE-2023-1355 |
CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 | CVE-2023-22043 |
CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2426 | CVE-2023-2603 | CVE-2023-2609 |
CVE-2023-2610 | CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 |
CVE-2023-3141 | CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-32001 |
CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 |
CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3776 |
CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 | CVE-2023-4016 | CVE-2023-4156 |
Notes, cautions, and warnings
NOTE : A NOTE indicates important information that helps you make better
use of your product.
CAUTION : A CAUTION indicates either potential damage to hardware or loss
of data and tells you how to avoid the problem.
WARNING : A WARNING indicates a potential for property damage, personal
injury, or death.
© 2017 – 2023 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.
Frequently Asked Questions
- Q: What products are supported by the Avamar platform OS security patch rollup?
- A: The security patch rollup applies to Avamar server, Avamar combined proxy, Avamar Virtual Edition (AVE), Avamar Data Store (ADS), Avamar NDMP accelerator node, NetWorker Virtual Edition (NVE), and PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA).
- Q: How much free space is required on the /boot volume when applying the Security Rollup?
- A: When applied manually, 80MB of free space is required on the /boot volume. The required amount may vary when applying the rollup via avinstaller.
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>