DELL ቴክኖሎጂስ 2023R3 አቫማር መድረክ የስርዓተ ክወና ደህንነት መጠገኛ ጥቅል

ዝርዝሮች
- የምርት ስም፡- Dell Avamar Platform OS Security Patch Rollup
- ስሪት፡ 2023R3
- አምራች፡ ዴል Inc.
- የሚደገፉ ምርቶች
- አቫማር አገልጋይ
- አቫማር የተዋሃደ ፕሮክሲ
- አቫማር ምናባዊ እትም (AVE)
- አቫማር ዳታ ማከማቻ (ኤ.ዲ.ኤስ)
- አቫማር NDMP የፍጥነት መቆጣጠሪያ መስቀለኛ መንገድ
- NetWorker ምናባዊ እትም (NVE)
- የPowerProtect DP Series Appliance/የተዋሃደ የውሂብ ጥበቃ መተግበሪያ (IDPA)
- የሶስተኛ ወገን አካላት ተዘምነዋል፡-
- የጃቫ አሂድ አካባቢ (JRE)
- Apache Tomcat
- BSAFE OwB FIPS ጥቅል
የክለሳ ታሪክ
የሚከተለው ሰንጠረዥ የዚህን ሰነድ የክለሳ ታሪክ ያቀርባል. ሠንጠረዥ 1. የክለሳ ታሪክ
ሠንጠረዥ 1. የክለሳ ታሪክ
| ክለሳ | ቀን | መግለጫ |
| 01 | ኦክቶበር 2023 | የዚህ ሰነድ መጀመሪያ የተለቀቀው ለ2023R3። |
አቫማር የመሳሪያ ስርዓት የስርዓተ ክወና ደህንነት መጠገኛ ጥቅል
የአቫማር ፕላትፎርም የስርዓተ ክወና የደህንነት መጠገኛ ጥቅል የደህንነት እና የስርዓተ ክወና ማሻሻያዎችን ተግባራዊ ለማድረግ የሚያስፈልጉትን እርምጃዎች በራስ ሰር የሚሰራ ሲሆን ይህም በታቀደላቸው የአቫማር አገልጋይ ሶፍትዌር ልቀቶች መካከል በየጊዜው የሚለቀቁ ናቸው።
እነዚህ የመልቀቂያ ማስታወሻዎች በእያንዳንዱ የደህንነት መጠገኛ የተገለጹትን የተለመዱ ተጋላጭነቶች እና ተጋላጭነቶች (CVEs) ዝርዝሮችን ይሰጣሉ።
በዚህ ሰነድ ውስጥ የተዘረዘሩት የደህንነት መጠገኛዎች በሚከተሉት ምርቶች ላይ ተፈጻሚ ይሆናሉ፡
- አቫማር አገልጋይ
- አቫማር የተዋሃደ ፕሮክሲ
- አቫማር ምናባዊ እትም (AVE)
- አቫማር ዳታ ማከማቻ (ኤ.ዲ.ኤስ)
- አቫማር NDMP የፍጥነት መቆጣጠሪያ መስቀለኛ መንገድ
- NetWorker ምናባዊ እትም (NVE)
- የPowerProtect DP Series Appliance/የተዋሃደ የውሂብ ጥበቃ መተግበሪያ (IDPA)
በድጋፍ ጣቢያው ላይ የእነዚህ ምርቶች የቅርብ ጊዜው የ Dell Security Advisory (DSA) KB መጣጥፍ የድጋፍ ማትሪክስ ይሰጣል።
ይህ የአቫማር የመሳሪያ ስርዓት የስርዓተ ክወና ደህንነት መጠገኛ ጥቅል ካለ የሚከተሉትን የሶስተኛ ወገን አካላት ያዘምናል፡
- የጃቫ አሂድ አካባቢ (JRE)
- Apache Tomcat
- BSAFE OwB FIPS ጥቅል
አጽዳ / ቡት ድምጽ
ካስፈለገ የስርዓተ ክወና የደህንነት መጠገኛ ጥቅልን በኤ.ዲ.ኤስ ላይ ሲተገበሩ በአገልጋዩ/ቡት ድምጽ ላይ ቦታ ለማስለቀቅ ይህን አሰራር ያከናውኑ።
ስለዚህ ተግባር
ማስታወሻበብዙ መስቀለኛ መንገድ አገልጋይ ውስጥ ያሉት ሁሉም ኖዶች በ / ቡት ቮልዩ ላይ የሚፈለገው ነፃ ቦታ እንዲኖራቸው ለማድረግ ይህንን አሰራር በመገልገያ መስቀለኛ መንገድ ፣ በሁሉም የማከማቻ ኖዶች ፣ መለዋወጫ ኖዶች እና አፋጣኝ ኖዶች (ካለ) ያድርጉ።
ማስታወሻ፡- የሴኪዩሪቲ ማጠቃለያውን እራስዎ ሲተገብሩ የሚፈለገው የነጻ ቦታ መጠን በ/ቡት መጠን 80MB ነው።
ጥቅልን በአቭ ጫኝ በኩል ሲያመለክቱ የሚፈለገው የነጻ ቦታ መጠን በ/ቡት ልቀቶች መካከል ይለያያል። የሚከተለው ሠንጠረዥ ጥቅሉ ምን ያህል ነጻ ቦታ እንደሚያስፈልግ ይወስናል። ይህንን እሴት ከሚታየው ነፃ ቦታ ጋር ያወዳድሩ። መቼ
ጥቅልው በእጅ ይተገበራል ፣ የሚፈለገው የነፃ ቦታ መጠን በ / ቡት ድምጽ ላይ ለእያንዳንዱ ልቀት 80 ሜባ ነው።
ሠንጠረዥ 2. ነፃ ቦታ ኢላማዎች
| ጥቅል ስሪት | የነጻ ቦታ ኢላማ |
| 2022R1 እና ከዚያ በኋላ | NA |
እርምጃዎች
- የትእዛዝ ሼል ይክፈቱ እና ከሚከተሉት ዘዴዎች ውስጥ አንዱን በመጠቀም ይግቡ።
- ለነጠላ መስቀለኛ መንገድ አገልጋይ ወደ አገልጋዩ እንደ አስተዳዳሪ ይግቡ እና ከዚያ ሱ - በማሄድ ተጠቃሚውን ወደ ስርወ ይለውጡ።
- ለባለብዙ መስቀለኛ መንገድ አገልጋይ እንደ አስተዳዳሪ ወደ መገልገያ መስቀለኛ መንገድ ይግቡ እና ከዚያ su - በማሄድ ተጠቃሚውን ወደ ስርወ ይቀይሩ።
- የሚከተለውን ትዕዛዝ በመተየብ መጠኑን እና ነፃ ቦታን በ / boot volume ላይ ያረጋግጡ።
df -h /ቡት/- Fileየስርዓት መጠን ጥቅም ላይ የዋለው ጥቅም አጠቃቀም% ተጭኗል
- /dev/sda1 98M 13M 81M 14% /ቡት
መጠኑ ለዚህ ጥቅል ስሪት የነጻ ቦታ ኢላማውን የሚያሟላ መሆኑን ያረጋግጡ።
- * -kdump ይመልከቱ fileየሚከተለውን ትዕዛዝ በመተየብ በ / boot volume ላይ s:
ls -l /ቡት/* kdump
ከሚከተሉት ጋር ተመሳሳይ የሆነ መረጃ በትእዛዝ ሼል ውስጥ ይታያል:- – rw-r–r– 1 ሥር ሥር 10517730 ኦገስት 1 13፡14 /boot/vmlinux-KERNEL_VERSION-kdump
- kdump አስወግድ fileየሚከተለውን ትእዛዝ በመተየብ በ / ማስነሻ ድምጽ ላይ
rm /ቡት/* kdump - የሚከተለውን ትዕዛዝ በመተየብ የተጫኑትን ኮርነሎች ይዘርዝሩ፡
rpm -qa | grep kernel-ነባሪ- የከርነል-ነባሪ-መሠረት-VERSION_NEW
- kernel-default-base-VERSION_OLD
- የከርነል-ነባሪ-VERSION_NEW
- የከርነል-ነባሪ-VERSION_OLD
- የሚከተለውን ትዕዛዝ በመተየብ የከርነል ስሪቱን ያሳዩ፡
ስም-አልባ - ሀ
የሊኑክስ ሙከራ VERSION_NEW #1 SMP Thu ኦገስት 1 15:34:33 UTC 2019 (47e48a4) x86_64 x86_64 x86_64 ጂኤንዩ/ሊኑክስ - ከተጫኑት የከርነሎች ዝርዝር ውስጥ ማንኛውንም የቆዩ አስኳሎች ይለዩ። አሂድ የከርነል ሥሪትን አግልል።
- ካለ፣ የሚከተለውን ትዕዛዝ በአንድ መስመር ላይ በመተየብ ማንኛውንም የቆዩ አስኳሎች ያስወግዱ።
በደቂቃ -ev kernel-ነባሪ-VERSION_OLD ከርነል-ነባሪ-መሰረት-VERSION_OLD - የተጫነውን እና የሚሰራውን ከርነል ለማንኛውም የቆየ ከርነል እንደገና ይፈትሹ files in / boot. ካሉ, እራስዎ ያስወግዱዋቸው.
- በማህደር የተቀመጠ .gz እንዳለ ያረጋግጡ fileየሚከተለውን ትዕዛዝ በመተየብ በ / boot volume ላይ s:
ls -l /ቡት/*.gz- – rw-r–r– 1 root root 357826 Oct 31 2018 /boot/symvers-VERSION_OLD-default.gz
- – rw-r–r– 1 root root 358659 ኦገስት 1 13፡14 /boot/symvers-VERSION_NEW-default.gz
- – rw-r–r– 1 root root 10501442 Oct 31 2018 /boot/vmlinux-VERSION_OLD-default.gz
- – rw-r–r– 1 root root 10517730 ኦገስት 1 13፡14 /boot/vmlinux-VERSION_NEW-default.gz
- አስፈላጊ ከሆነ ማንኛውንም በማህደር የተቀመጠ .gz ያስወግዱ fileየሚከተለውን ትዕዛዝ በመተየብ በ / boot volume ላይ s:
rm /ቡት/*.gz - በ / ቡት ድምጽ ላይ ያለው ቦታ አሁንም በቂ ካልሆነ (ከ 80 ሜባ ያነሰ) (ለእጅ ጭነት) ምትኬ ያስቀምጡ እና የሩጫውን ከርነል ያስወግዱት:
mkdir /usr/local/avamar/var/rollup_bak
mv /boot/*VERSION_NEW*
/usr/local/avamar/var/rollup_bak
ማስታወሻ፡- የደህንነት ጥቅል መጫኑ ከተጠናቀቀ በኋላ የሩጫውን ከርነል ወደነበረበት መመለስን አይርሱ fileደረጃ 14 ን በመከተል። - የሚከተለውን ትዕዛዝ በመተየብ መጠኑን እና ነፃ ቦታን በ / boot volume ላይ ያረጋግጡ: df -h /boot/
- ለእጅ ጭነት፣ ጥቅል መጫኑ ከተጠናቀቀ በኋላ የሚከተለውን ትዕዛዝ በመተየብ የሩጫውን ከርነል ወደነበረበት ይመልሱ (በደረጃ 12 ምትኬ ከተሰራ)።
- mv /usr/local/avamar/var/rollup_bak/*-ነባሪ/ቡት
- rm -r /usr/local/avamar/var/rollup_bak
2023R3 CVEs
ይህ ልቀት በመድረክ እንደተገለጸው ለሚከተሉት CVEs ጥገናዎችን ይዟል። የሚመለከታቸው ጥቅሎች እና RPM ጨምሮ ለCVE ዝርዝሮች ከእያንዳንዱ ልቀት ጋር የተካተተውን የተመን ሉህ ይመልከቱ files.
SUSE Linux Enterprise Server 12 SP5 CVE ዝርዝር ለአቫማር አገልጋይ
በዚህ ክፍል ውስጥ ያሉት CVEs በአቫማር አገልጋይ ላይ ለ SLES 12 SP5 ተፈጻሚ ይሆናሉ።
ሠንጠረዥ 3. 2023R3 CVEs ለ SLES 12 SP5 በአቫማር አገልጋይ
| CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 |
| CVE-2012-4929 | CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 |
| CVE-2013-1739 | CVE-2013-1740 | CVE-2013-5605 | CVE-2014-1492 |
| CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 | CVE-2014-4877 |
| CVE-2014-5044 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 |
| CVE-2015-4000 | CVE-2015-5276 | CVE-2015-7181 | CVE-2015-7182 |
| CVE-2015-7183 | CVE-2015-7575 | CVE-2015-8985 | CVE-2016-1938 |
| CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 |
| CVE-2016-4971 | CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 |
| CVE-2016-8635 | CVE-2016-9074 | CVE-2016-9574 | CVE-2017-1000251 |
| CVE-2017-1000252 | CVE-2017-1000255 | CVE-2017-1000410 | CVE-2017-10989 |
| CVE-2017-11473 | CVE-2017-11600 | CVE-2017-11671 | CVE-2017-12153 |
| CVE-2017-12154 | CVE-2017-12190 | CVE-2017-12193 | CVE-2017-13080 |
| CVE-2017-13089 | CVE-2017-13090 | CVE-2017-13166 | CVE-2017-13695 |
| CVE-2017-14051 | CVE-2017-14489 | CVE-2017-15115 | CVE-2017-15127 |
| CVE-2017-15128 | CVE-2017-15129 | CVE-2017-15265 | CVE-2017-15537 |
| CVE-2017-15649 | CVE-2017-15951 | CVE-2017-16525 | CVE-2017-16527 |
| CVE-2017-16528 | CVE-2017-16529 | CVE-2017-16531 | CVE-2017-16533 |
| CVE-2017-16534 | CVE-2017-16535 | CVE-2017-16536 | CVE-2017-16537 |
| CVE-2017-16538 | CVE-2017-16644 | CVE-2017-16645 | CVE-2017-16646 |
| CVE-2017-16647 | CVE-2017-16649 | CVE-2017-16650 | CVE-2017-16911 |
| CVE-2017-16912 | CVE-2017-16913 | CVE-2017-16914 | CVE-2017-16939 |
| CVE-2017-16994 | CVE-2017-16995 | CVE-2017-16996 | CVE-2017-17052 |
| CVE-2017-17448 | CVE-2017-17449 | CVE-2017-17450 | CVE-2017-17558 |
| CVE-2017-17712 | CVE-2017-17741 | CVE-2017-17805 | CVE-2017-17806 |
| CVE-2017-17852 | CVE-2017-17853 | CVE-2017-17854 | CVE-2017-17855 |
| CVE-2017-17856 | CVE-2017-17857 | CVE-2017-17862 | CVE-2017-17864 |
| CVE-2017-17975 | CVE-2017-18075 | CVE-2017-18202 | CVE-2017-18203 |
| CVE-2017-18204 | CVE-2017-18208 | CVE-2017-18224 | CVE-2017-18344 |
| CVE-2017-18551 | CVE-2017-18595 | CVE-2017-2518 | CVE-2017-5715 |
| CVE-2017-5753 | CVE-2017-5754 | CVE-2017-6508 | CVE-2017-7541 |
| CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 |
| CVE-2012-4929 | CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 |
| CVE-2013-1739 | CVE-2013-1740 | CVE-2013-5605 | CVE-2014-1492 |
| CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 | CVE-2014-4877 |
| CVE-2014-5044 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 |
| CVE-2015-4000 | CVE-2015-5276 | CVE-2015-7181 | CVE-2015-7182 |
| CVE-2015-7183 | CVE-2015-7575 | CVE-2015-8985 | CVE-2016-1938 |
| CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 |
| CVE-2016-4971 | CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 |
| CVE-2016-8635 | CVE-2016-9074 | CVE-2016-9574 | CVE-2017-1000251 |
| CVE-2017-1000252 | CVE-2017-1000255 | CVE-2017-1000410 | CVE-2017-10989 |
| CVE-2017-11473 | CVE-2017-11600 | CVE-2017-11671 | CVE-2017-12153 |
| CVE-2017-12154 | CVE-2017-12190 | CVE-2017-12193 | CVE-2017-13080 |
| CVE-2017-13089 | CVE-2017-13090 | CVE-2017-13166 | CVE-2017-13695 |
| CVE-2017-14051 | CVE-2017-14489 | CVE-2017-15115 | CVE-2017-15127 |
| CVE-2017-15128 | CVE-2017-15129 | CVE-2017-15265 | CVE-2017-15537 |
| CVE-2017-15649 | CVE-2017-15951 | CVE-2017-16525 | CVE-2017-16527 |
| CVE-2017-16528 | CVE-2017-16529 | CVE-2017-16531 | CVE-2017-16533 |
| CVE-2017-16534 | CVE-2017-16535 | CVE-2017-16536 | CVE-2017-16537 |
| CVE-2017-16538 | CVE-2017-16644 | CVE-2017-16645 | CVE-2017-16646 |
| CVE-2017-16647 | CVE-2017-16649 | CVE-2017-16650 | CVE-2017-16911 |
| CVE-2017-16912 | CVE-2017-16913 | CVE-2017-16914 | CVE-2017-16939 |
| CVE-2017-16994 | CVE-2017-16995 | CVE-2017-16996 | CVE-2017-17052 |
| CVE-2017-17448 | CVE-2017-17449 | CVE-2017-17450 | CVE-2017-17558 |
| CVE-2017-17712 | CVE-2017-17741 | CVE-2017-17805 | CVE-2017-17806 |
| CVE-2017-17852 | CVE-2017-17853 | CVE-2017-17854 | CVE-2017-17855 |
| CVE-2017-17856 | CVE-2017-17857 | CVE-2017-17862 | CVE-2017-17864 |
| CVE-2017-17975 | CVE-2017-18075 | CVE-2017-18202 | CVE-2017-18203 |
| CVE-2017-18204 | CVE-2017-18208 | CVE-2017-18224 | CVE-2017-18344 |
| CVE-2017-18551 | CVE-2017-18595 | CVE-2017-2518 | CVE-2017-5715 |
| CVE-2017-5753 | CVE-2017-5754 | CVE-2017-6508 | CVE-2017-7541 |
| CVE-2019-15126 | CVE-2019-15211 | CVE-2019-15212 | CVE-2019-15213 |
| CVE-2019-15214 | CVE-2019-15215 | CVE-2019-15216 | CVE-2019-15217 |
| CVE-2019-15218 | CVE-2019-15219 | CVE-2019-15220 | CVE-2019-15221 |
| CVE-2019-15222 | CVE-2019-15239 | CVE-2019-15290 | CVE-2019-15291 |
| CVE-2019-15292 | CVE-2019-15538 | CVE-2019-15666 | CVE-2019-15902 |
| CVE-2019-15916 | CVE-2019-15917 | CVE-2019-15919 | CVE-2019-15920 |
| CVE-2019-15921 | CVE-2019-15924 | CVE-2019-15926 | CVE-2019-15927 |
| CVE-2019-16168 | CVE-2019-16231 | CVE-2019-16232 | CVE-2019-16233 |
| CVE-2019-16234 | CVE-2019-16746 | CVE-2019-16994 | CVE-2019-16995 |
| CVE-2019-17006 | CVE-2019-17055 | CVE-2019-17056 | CVE-2019-17133 |
| CVE-2019-17666 | CVE-2019-18660 | CVE-2019-18683 | CVE-2019-18805 |
| CVE-2019-18808 | CVE-2019-18809 | CVE-2019-19036 | CVE-2019-19045 |
| CVE-2019-19046 | CVE-2019-19049 | CVE-2019-19051 | CVE-2019-19052 |
| CVE-2019-19054 | CVE-2019-19056 | CVE-2019-19057 | CVE-2019-19058 |
| CVE-2019-19060 | CVE-2019-19062 | CVE-2019-19063 | CVE-2019-19065 |
| CVE-2019-19066 | CVE-2019-19067 | CVE-2019-19068 | CVE-2019-19073 |
| CVE-2019-19074 | CVE-2019-19075 | CVE-2019-19077 | CVE-2019-19078 |
| CVE-2019-19080 | CVE-2019-19081 | CVE-2019-19082 | CVE-2019-19083 |
| CVE-2019-19227 | CVE-2019-19244 | CVE-2019-19317 | CVE-2019-19318 |
| CVE-2019-19319 | CVE-2019-19332 | CVE-2019-19338 | CVE-2019-19377 |
| CVE-2019-19447 | CVE-2019-19462 | CVE-2019-19523 | CVE-2019-19524 |
| CVE-2019-19525 | CVE-2019-19526 | CVE-2019-19527 | CVE-2019-19528 |
| CVE-2019-19529 | CVE-2019-19530 | CVE-2019-19531 | CVE-2019-19532 |
| CVE-2019-19533 | CVE-2019-19534 | CVE-2019-19535 | CVE-2019-19536 |
| CVE-2019-19537 | CVE-2019-19543 | CVE-2019-19603 | CVE-2019-19645 |
| CVE-2019-19646 | CVE-2019-19767 | CVE-2019-19768 | CVE-2019-19770 |
| CVE-2019-19880 | CVE-2019-19923 | CVE-2019-19924 | CVE-2019-19925 |
| CVE-2019-19926 | CVE-2019-19927 | CVE-2019-19959 | CVE-2019-19965 |
| CVE-2019-19966 | CVE-2019-20054 | CVE-2019-20095 | CVE-2019-20096 |
| CVE-2019-20218 | CVE-2019-2024 | CVE-2019-20806 | CVE-2019-20810 |
| CVE-2019-20811 | CVE-2019-20812 | CVE-2019-20908 | CVE-2019-20934 |
| CVE-2019-25045 | CVE-2019-3459 | CVE-2019-3460 | CVE-2019-3560 |
| CVE-2019-3701 | CVE-2019-3819 | CVE-2019-3846 | CVE-2019-3874 |
| CVE-2019-3882 | CVE-2019-3900 | CVE-2019-5489 | CVE-2019-5953 |
| CVE-2019-6974 | CVE-2019-7221 | CVE-2019-7222 | CVE-2019-7308 |
| CVE-2019-8457 | CVE-2019-8564 | CVE-2019-8912 | CVE-2019-8980 |
| CVE-2019-9003 | CVE-2019-9213 | CVE-2019-9455 | CVE-2019-9456 |
| CVE-2019-9458 | CVE-2019-9500 | CVE-2019-9503 | CVE-2019-9506 |
| CVE-2020-0305 | CVE-2020-0404 | CVE-2020-0427 | CVE-2020-0429 |
| CVE-2020-0430 | CVE-2020-0431 | CVE-2020-0432 | CVE-2020-0433 |
| CVE-2020-0444 | CVE-2020-0465 | CVE-2020-0466 | CVE-2020-0543 |
| CVE-2020-10135 | CVE-2020-10690 | CVE-2020-10711 | CVE-2020-10720 |
| CVE-2020-10732 | CVE-2020-10751 | CVE-2020-10757 | CVE-2020-10766 |
| CVE-2020-10767 | CVE-2020-10768 | CVE-2020-10769 | CVE-2020-10773 |
| CVE-2020-10781 | CVE-2020-10942 | CVE-2020-11494 | CVE-2020-11608 |
| CVE-2020-11609 | CVE-2020-11668 | CVE-2020-11669 | CVE-2020-12114 |
| CVE-2020-12351 | CVE-2020-12352 | CVE-2020-12399 | CVE-2020-12400 |
| CVE-2020-12401 | CVE-2020-12402 | CVE-2020-12403 | CVE-2020-12464 |
| CVE-2020-12652 | CVE-2020-12653 | CVE-2020-12654 | CVE-2020-12655 |
| CVE-2020-12656 | CVE-2020-12657 | CVE-2020-12659 | CVE-2020-12769 |
| CVE-2020-12770 | CVE-2020-12771 | CVE-2020-12888 | CVE-2020-13143 |
| CVE-2020-13434 | CVE-2020-13435 | CVE-2020-13630 | CVE-2020-13631 |
| CVE-2020-13632 | CVE-2020-13974 | CVE-2020-14314 | CVE-2020-14331 |
| CVE-2020-14351 | CVE-2020-14356 | CVE-2020-14381 | CVE-2020-14386 |
| CVE-2020-14390 | CVE-2020-14416 | CVE-2020-15358 | CVE-2020-15393 |
| CVE-2020-15436 | CVE-2020-15437 | CVE-2020-15780 | CVE-2020-16120 |
| CVE-2020-16166 | CVE-2020-16305 | CVE-2020-1749 | CVE-2020-24394 |
| CVE-2020-24586 | CVE-2020-24587 | CVE-2020-24588 | CVE-2020-2521 |
| CVE-2020-25211 | CVE-2020-25212 | CVE-2020-25284 | CVE-2020-25285 |
| CVE-2020-25639 | CVE-2020-25641 | CVE-2020-25643 | CVE-2020-25645 |
| CVE-2020-25648 | CVE-2020-25656 | CVE-2020-25668 | CVE-2020-25669 |
| CVE-2020-25670 | CVE-2020-25671 | CVE-2020-25672 | CVE-2020-25673 |
| CVE-2020-25704 | CVE-2020-25705 | CVE-2020-26088 | CVE-2020-26139 |
| CVE-2020-26141 | CVE-2020-26145 | CVE-2020-26147 | CVE-2020-26541 |
| CVE-2020-26558 | CVE-2020-27068 | CVE-2020-27170 | CVE-2020-27171 |
| CVE-2020-2732 | CVE-2020-27673 | CVE-2020-27675 | CVE-2020-27777 |
| CVE-2020-27786 | CVE-2020-27815 | CVE-2020-27820 | CVE-2020-27825 |
| CVE-2020-27835 | CVE-2020-28097 | CVE-2020-28374 | CVE-2020-28915 |
| CVE-2020-28974 | CVE-2020-29368 | CVE-2020-29371 | CVE-2020-29568 |
| CVE-2020-29569 | CVE-2020-29660 | CVE-2020-29661 | CVE-2020-35519 |
| CVE-2020-36158 | CVE-2020-36310 | CVE-2020-36311 | CVE-2020-36312 |
| CVE-2020-36322 | CVE-2020-36385 | CVE-2020-36386 | CVE-2020-36516 |
| CVE-2020-36557 | CVE-2020-36558 | CVE-2020-36691 | CVE-2020-3702 |
| CVE-2020-4788 | CVE-2020-6829 | CVE-2020-7053 | CVE-2020-8428 |
| CVE-2020-8647 | CVE-2020-8648 | CVE-2020-8649 | CVE-2020-8694 |
| CVE-2020-8834 | CVE-2020-8992 | CVE-2020-9327 | CVE-2020-9383 |
| CVE-2021-0129 | CVE-2021-0342 | CVE-2021-0512 | CVE-2021-0605 |
| CVE-2021-0920 | CVE-2021-0935 | CVE-2021-0941 | CVE-2021-20177 |
| CVE-2021-20219 | CVE-2021-20292 | CVE-2021-20321 | CVE-2021-20322 |
| CVE-2021-22543 | CVE-2021-22555 | CVE-2021-23133 | CVE-2021-23134 |
| CVE-2021-26341 | CVE-2021-26930 | CVE-2021-26931 | CVE-2021-26932 |
| CVE-2021-27363 | CVE-2021-27364 | CVE-2021-27365 | CVE-2021-28038 |
| CVE-2021-28660 | CVE-2021-28688 | CVE-2021-28711 | CVE-2021-28712 |
| CVE-2021-28713 | CVE-2021-28714 | CVE-2021-28715 | CVE-2021-28950 |
| CVE-2021-28964 | CVE-2021-28971 | CVE-2021-28972 | CVE-2021-29154 |
| CVE-2021-29155 | CVE-2021-29264 | CVE-2021-29265 | CVE-2021-29647 |
| CVE-2021-29650 | CVE-2021-30002 | CVE-2021-31916 | CVE-2021-32399 |
| CVE-2021-33033 | CVE-2021-33034 | CVE-2021-33061 | CVE-2021-33098 |
| CVE-2021-33200 | CVE-2021-3347 | CVE-2021-3348 | CVE-2021-33624 |
| CVE-2021-33655 | CVE-2021-33656 | CVE-2021-33909 | CVE-2021-3428 |
| CVE-2021-3444 | CVE-2021-34556 | CVE-2021-34693 | CVE-2021-3483 |
| CVE-2021-3491 | CVE-2021-34981 | CVE-2021-3542 | CVE-2021-35477 |
| CVE-2021-3564 | CVE-2021-3609 | CVE-2021-3612 | CVE-2021-3640 |
| CVE-2021-3653 | CVE-2021-3655 | CVE-2021-3656 | CVE-2021-3659 |
| CVE-2021-36690 | CVE-2021-3679 | CVE-2021-3715 | CVE-2021-37159 |
| CVE-2021-3732 | CVE-2021-3744 | CVE-2021-3752 | CVE-2021-3753 |
| CVE-2021-37576 | CVE-2021-3759 | CVE-2021-3760 | CVE-2021-3764 |
| CVE-2021-3772 | CVE-2021-38160 | CVE-2021-38198 | CVE-2021-38204 |
| CVE-2021-38208 | CVE-2021-3923 | CVE-2021-39648 | CVE-2021-39657 |
| CVE-2021-39711 | CVE-2021-39713 | CVE-2021-4002 | CVE-2021-4037 |
| CVE-2021-40490 | CVE-2021-4083 | CVE-2021-4135 | CVE-2021-4149 |
| CVE-2021-4157 | CVE-2021-41864 | CVE-2021-4197 | CVE-2021-42008 |
| CVE-2021-4202 | CVE-2021-4203 | CVE-2021-42252 | CVE-2021-42739 |
| CVE-2021-43389 | CVE-2021-43527 | CVE-2021-43975 | CVE-2021-43976 |
| CVE-2021-44733 | CVE-2021-44879 | CVE-2021-45095 | CVE-2021-45485 |
| CVE-2021-45486 | CVE-2021-45868 | CVE-2022-0001 | CVE-2022-0002 |
| CVE-2022-0322 | CVE-2022-0330 | CVE-2022-0435 | CVE-2022-0487 |
| CVE-2022-0492 | CVE-2022-0617 | CVE-2022-0644 | CVE-2022-0812 |
| CVE-2022-0847 | CVE-2022-0850 | CVE-2022-0886 | CVE-2022-1011 |
| CVE-2022-1012 | CVE-2022-1016 | CVE-2022-1048 | CVE-2022-1097 |
| CVE-2022-1184 | CVE-2022-1280 | CVE-2022-1353 | CVE-2022-1419 |
| CVE-2022-1462 | CVE-2022-1516 | CVE-2022-1652 | CVE-2022-1679 |
| CVE-2022-1729 | CVE-2022-1734 | CVE-2022-1836 | CVE-2022-1974 |
| CVE-2022-1975 | CVE-2022-20008 | CVE-2022-20132 | CVE-2022-20141 |
| CVE-2022-20154 | CVE-2022-20166 | CVE-2022-20368 | CVE-2022-20369 |
| CVE-2022-20567 | CVE-2022-21123 | CVE-2022-21125 | CVE-2022-21127 |
| CVE-2022-21166 | CVE-2022-21180 | CVE-2022-2127 | CVE-2022-21385 |
| CVE-2022-21499 | CVE-2022-2153 | CVE-2022-22942 | CVE-2022-23036 |
| CVE-2022-23037 | CVE-2022-23038 | CVE-2022-23039 | CVE-2022-23040 |
| CVE-2022-23041 | CVE-2022-23042 | CVE-2022-2318 | CVE-2022-23491 |
| CVE-2022-23960 | CVE-2022-24448 | CVE-2022-24959 | CVE-2022-2503 |
| CVE-2022-2588 | CVE-2022-26365 | CVE-2022-26373 | CVE-2022-2639 |
| CVE-2022-26490 | CVE-2022-2663 | CVE-2022-26966 | CVE-2022-28356 |
| CVE-2022-28388 | CVE-2022-28389 | CVE-2022-28390 | CVE-2022-28693 |
| CVE-2022-28748 | CVE-2022-29581 | CVE-2022-2964 | CVE-2022-2977 |
| CVE-2022-29900 | CVE-2022-29901 | CVE-2022-2991 | CVE-2022-3028 |
| CVE-2022-30594 | CVE-2022-3107 | CVE-2022-3108 | CVE-2022-3169 |
| CVE-2022-32296 | CVE-2022-3239 | CVE-2022-3303 | CVE-2022-33740 |
| CVE-2022-33741 | CVE-2022-33742 | CVE-2022-33981 | CVE-2022-3424 |
| CVE-2022-3479 | CVE-2022-3521 | CVE-2022-3524 | CVE-2022-3542 |
| CVE-2022-3545 | CVE-2022-3564 | CVE-2022-3565 | CVE-2022-3566 |
| CVE-2022-3567 | CVE-2022-35737 | CVE-2022-3586 | CVE-2022-3594 |
| CVE-2022-3621 | CVE-2022-3628 | CVE-2022-36280 | CVE-2022-3629 |
| CVE-2022-3635 | CVE-2022-3643 | CVE-2022-3646 | CVE-2022-3649 |
| CVE-2022-36879 | CVE-2022-36946 | CVE-2022-38096 | CVE-2022-3903 |
| CVE-2022-39188 | CVE-2022-40307 | CVE-2022-40768 | CVE-2022-4095 |
| CVE-2022-40982 | CVE-2022-41218 | CVE-2022-4129 | CVE-2022-41848 |
| CVE-2022-41850 | CVE-2022-41858 | CVE-2022-42328 | CVE-2022-42329 |
| CVE-2022-42703 | CVE-2022-42895 | CVE-2022-42896 | CVE-2022-43750 |
| CVE-2022-4378 | CVE-2022-43945 | CVE-2022-45884 | CVE-2022-45885 |
| CVE-2022-45886 | CVE-2022-45887 | CVE-2022-45919 | CVE-2022-45934 |
| CVE-2022-4662 | CVE-2022-46908 | CVE-2022-47929 | CVE-2023-0045 |
| CVE-2023-0266 | CVE-2023-0459 | CVE-2023-0590 | CVE-2023-0597 |
| CVE-2023-0767 | CVE-2023-1076 | CVE-2023-1077 | CVE-2023-1079 |
| CVE-2023-1095 | CVE-2023-1118 | CVE-2023-1249 | CVE-2023-1264 |
| CVE-2023-1281 | CVE-2023-1355 | CVE-2023-1380 | CVE-2023-1390 |
| CVE-2023-1513 | CVE-2023-1611 | CVE-2023-1637 | CVE-2023-1670 |
| CVE-2023-1855 | CVE-2023-1989 | CVE-2023-1990 | CVE-2023-1998 |
| CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 | CVE-2023-2124 |
| CVE-2023-2162 | CVE-2023-2176 | CVE-2023-2194 | CVE-2023-22043 |
| CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2269 | CVE-2023-23454 |
| CVE-2023-23455 | CVE-2023-23559 | CVE-2023-2426 | CVE-2023-2483 |
| CVE-2023-2513 | CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 |
| CVE-2023-26545 | CVE-2023-2828 | CVE-2023-28328 | CVE-2023-28464 |
| CVE-2023-28466 | CVE-2023-28772 | CVE-2023-2985 | CVE-2023-30772 |
| CVE-2023-3090 | CVE-2023-31084 | CVE-2023-3111 | CVE-2023-3141 |
| CVE-2023-31436 | CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 |
| CVE-2023-32001 | CVE-2023-32269 | CVE-2023-3268 | CVE-2023-3358 |
| CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 |
| CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
| CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 |
| CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 |
| CVE-2023-39417 | CVE-2023-39418 | CVE-2023-4016 | CVE-2023-4156 |
| CVE-2016-5384 | CVE-2018-10906 | CVE-2014-9474 | CVE-2019-19977 |
| CVE-2016-9427 | CVE-2017-1000112 | CVE-2014-7844 | CVE-2023-26604 |
| CVE-2022-27404 | CVE-2017-10672 |
SUSE Linux Enterprise Server 12 SP5 CVE ዝርዝር ለአቫማር ጥምር ፕሮክሲ
በዚህ ክፍል ውስጥ ያሉት CVEs በአቫማር ጥምር ፕሮክሲ ላይ ለ SLES 12 SP5 ተፈጻሚ ይሆናሉ።
ሠንጠረዥ 4. 2023R3 CVEs ለ SLES 12 SP5 በአቫማር ጥምር ፕሮክሲ ላይ
| CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
| CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
| CVE-2019-5953 | CVE-2020-16305 | CVE-2022-2127 | CVE-2022-40982 | CVE-2022-41804 |
| CVE-2023-0459 | CVE-2023-1077 | CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1264 |
| CVE-2023-1355 | CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 |
| CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 | CVE-2023-23908 | CVE-2023-2426 |
| CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 | CVE-2023-2828 | CVE-2023-2985 |
| CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 | CVE-2023-31484 | CVE-2023-3159 |
| CVE-2023-3161 | CVE-2023-32001 | CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 |
| CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 |
| CVE-2023-3567 | CVE-2023-35824 | CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 |
| CVE-2023-36664 | CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 |
| CVE-2023-4016 | CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE ዝርዝር ለአንድ NVE
በዚህ ክፍል ውስጥ ያሉት CVEs በNVE ላይ ለ SLES 12 SP5 ተፈጻሚ ይሆናሉ።
ሠንጠረዥ 5. 2023R3 CVEs ለ SLES 12 SP5 በNVE
| CVE-2010-2252 | CVE-2010-3170 | CVE-2011-3389 | CVE-2011-3640 | CVE-2012-4929 |
| CVE-2013-0743 | CVE-2013-0791 | CVE-2013-1620 | CVE-2013-1739 | CVE-2013-1740 |
| CVE-2013-5605 | CVE-2014-1492 | CVE-2014-1545 | CVE-2014-1568 | CVE-2014-1569 |
| CVE-2014-4877 | CVE-2015-2059 | CVE-2015-3414 | CVE-2015-3415 | CVE-2015-4000 |
| CVE-2015-7181 | CVE-2015-7182 | CVE-2015-7183 | CVE-2015-7575 | CVE-2016-1938 |
| CVE-2016-1950 | CVE-2016-1978 | CVE-2016-1979 | CVE-2016-2834 | CVE-2016-4971 |
| CVE-2016-5285 | CVE-2016-6153 | CVE-2016-7098 | CVE-2016-8635 | CVE-2016-9074 |
| CVE-2016-9574 | CVE-2017-10989 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-2518 |
| CVE-2017-6508 | CVE-2017-7805 | CVE-2018-0494 | CVE-2018-0495 | CVE-2018-12384 |
| CVE-2018-12404 | CVE-2018-18508 | CVE-2018-20346 | CVE-2018-8740 | CVE-2019-11745 |
| CVE-2019-16168 | CVE-2019-17006 | CVE-2019-19244 | CVE-2019-19317 | CVE-2019-19603 |
| CVE-2019-19645 | CVE-2019-19646 | CVE-2019-19880 | CVE-2019-19923 | CVE-2019-19924 |
| CVE-2019-19925 | CVE-2019-19926 | CVE-2019-19959 | CVE-2019-20218 | CVE-2019-5953 |
| CVE-2019-8457 | CVE-2020-12399 | CVE-2020-12400 | CVE-2020-12401 | CVE-2020-12402 |
| CVE-2020-12403 | CVE-2020-13434 | CVE-2020-13435 | CVE-2020-13630 | CVE-2020-13631 |
| CVE-2020-13632 | CVE-2020-15358 | CVE-2020-16305 | CVE-2020-25648 | CVE-2020-6829 |
| CVE-2020-9327 | CVE-2021-36690 | CVE-2021-43527 | CVE-2022-1097 | CVE-2022-2127 |
| CVE-2022-23491 | CVE-2022-3479 | CVE-2022-35737 | CVE-2022-40982 | CVE-2022-46908 |
| CVE-2022-4904 | CVE-2023-0459 | CVE-2023-0767 | CVE-2023-1077 | CVE-2023-1079 |
| CVE-2023-1249 | CVE-2023-1264 | CVE-2023-1355 | CVE-2023-1637 | CVE-2023-2002 |
| CVE-2023-20569 | CVE-2023-20593 | CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 |
| CVE-2023-2426 | CVE-2023-2603 | CVE-2023-2609 | CVE-2023-2610 | CVE-2023-26112 |
| CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 |
| CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-32001 | CVE-2023-3268 |
| CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 | CVE-2023-34968 |
| CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 | CVE-2023-36054 |
| CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3776 | CVE-2023-3817 |
| CVE-2023-38408 | CVE-2023-38559 | CVE-2023-4016 | CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE ዝርዝር ለኤንዲኤምፒ አፋጣኝ መስቀለኛ መንገድ
በዚህ ክፍል ውስጥ ያሉት CVEs በNDMP accelerator node ላይ ለSLES 12 SP5 ተፈጻሚ ይሆናሉ።
ሠንጠረዥ 6. 2023R3 CVEs ለ SLES 12 SP5 በNDMP ማፍቻ መስቀለኛ መንገድ
| CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
| CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
| CVE-2019-5953 | CVE-2022-2127 | CVE-2022-40982 | CVE-2023-0459 | CVE-2023-1077 |
| CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 |
| CVE-2023-20593 | CVE-2023-22043 | CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2603 |
| CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 | CVE-2023-3141 |
| CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-3195 | CVE-2023-32001 |
| CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 |
| CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
| CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3745 |
| CVE-2023-3776 | CVE-2023-3817 | CVE-2023-38408 | CVE-2023-39417 | CVE-2023-39418 |
| CVE-2023-4156 |
SUSE Linux Enterprise Server 12 SP5 CVE ዝርዝር ለኤዲኤስ Gen5A NDMP ማፍጠኛ መስቀለኛ መንገድ
በዚህ ክፍል ውስጥ ያሉት CVEs በኤዲኤስ Gen12A NDMP ማፍጠኛ መስቀለኛ መንገድ ላይ ለSLES 5 SP5 ተፈጻሚ ይሆናሉ።
ሠንጠረዥ 7. 2023R3 CVEs ለ SLES 12 SP5 በADS Gen5A NDMP የፍጥነት መስቀለኛ መንገድ
| CVE-2010-2252 | CVE-2012-4929 | CVE-2014-4877 | CVE-2015-2059 | CVE-2016-4971 |
| CVE-2016-7098 | CVE-2017-13089 | CVE-2017-13090 | CVE-2017-6508 | CVE-2018-0494 |
| CVE-2019-5953 | CVE-2020-16305 | CVE-2022-2127 | CVE-2022-40982 | CVE-2023-0459 |
| CVE-2023-1077 | CVE-2023-1079 | CVE-2023-1249 | CVE-2023-1264 | CVE-2023-1355 |
| CVE-2023-1637 | CVE-2023-2002 | CVE-2023-20569 | CVE-2023-20593 | CVE-2023-22043 |
| CVE-2023-22045 | CVE-2023-22049 | CVE-2023-2426 | CVE-2023-2603 | CVE-2023-2609 |
| CVE-2023-2610 | CVE-2023-2828 | CVE-2023-2985 | CVE-2023-3090 | CVE-2023-3111 |
| CVE-2023-3141 | CVE-2023-31484 | CVE-2023-3159 | CVE-2023-3161 | CVE-2023-32001 |
| CVE-2023-3268 | CVE-2023-3358 | CVE-2023-3446 | CVE-2023-34966 | CVE-2023-34967 |
| CVE-2023-34968 | CVE-2023-34969 | CVE-2023-35001 | CVE-2023-3567 | CVE-2023-35824 |
| CVE-2023-36054 | CVE-2023-3609 | CVE-2023-3611 | CVE-2023-36664 | CVE-2023-3776 |
| CVE-2023-3817 | CVE-2023-38408 | CVE-2023-38559 | CVE-2023-4016 | CVE-2023-4156 |
ማስታወሻዎች፣ ማስጠንቀቂያዎች እና ማስጠንቀቂያዎች
ማስታወሻማስታወሻ፡ ምርትዎን በተሻለ ሁኔታ ለመጠቀም የሚረዳዎትን ጠቃሚ መረጃ ያመለክታል።
ጥንቃቄ: ጥንቃቄ በሃርድዌር ላይ ሊደርስ የሚችል ጉዳት ወይም የውሂብ መጥፋት ይጠቁማል እና ችግሩን እንዴት ማስወገድ እንደሚችሉ ይነግርዎታል።
ማስጠንቀቂያ: ማስጠንቀቂያ ለንብረት ውድመት፣ ለግል ጉዳት ወይም ለሞት ሊዳርግ እንደሚችል ያሳያል።
© 2017 – 2023 Dell Inc. ወይም ስርአቶቹ። ሁሉም መብቶች የተጠበቁ ናቸው። ዴል ቴክኖሎጂዎች፣ ዴል እና ሌሎች የንግድ ምልክቶች የዴል ኢንክ ወይም የቅርንጫፍ ቢሮዎቹ የንግድ ምልክቶች ናቸው። ሌሎች የንግድ ምልክቶች የየባለቤቶቻቸው የንግድ ምልክቶች ሊሆኑ ይችላሉ።
በተደጋጋሚ የሚጠየቁ ጥያቄዎች
- ጥ፡ በአቫማር መድረክ ስርዓተ ክወና የደህንነት መጠገኛ ጥቅል የሚደገፉት የትኞቹ ምርቶች ናቸው?
- መ፡ የደህንነት መጠገኛው ጥቅል ለአቫማር አገልጋይ፣ አቫማር ጥምር ፕሮክሲ፣ አቫማር ቨርቹዋል እትም (AVE)፣ አቫማር ዳታ ማከማቻ (ኤዲኤስ)፣ አቫማር NDMP አፋጣኝ መስቀለኛ መንገድ፣ ኔትወርከር ቨርቹዋል እትም (NVE) እና የPowerProtect DP Series Appliance/የተቀናጀ የውሂብ ጥበቃን ይመለከታል። መገልገያ (IDPA)።
- ጥ፡ የሴኪዩሪቲ ማጠቃለያውን ሲተገበር በ/boot volume ላይ ምን ያህል ነጻ ቦታ ያስፈልጋል?
- መ: በእጅ ሲተገበር 80MB ነፃ ቦታ በ/boot volume ላይ ያስፈልጋል። የሚፈለገው መጠን በ avinstaller በኩል ጥቅል ሲተገበር ሊለያይ ይችላል።
ሰነዶች / መርጃዎች
![]() |
DELL ቴክኖሎጂስ 2023R3 አቫማር መድረክ የስርዓተ ክወና ደህንነት መጠገኛ ጥቅል [pdf] የተጠቃሚ መመሪያ አቫማር አገልጋይ፣ አቫማር ጥምር ፕሮክሲ፣ አቫማር ቨርቹዋል እትም AVE፣ Avamar Data Store ADS፣ Avamar NDMP accelerator node፣ NetWorker Virtual Edition NVE፣ PowerProtect DP Series Appliance-Integrated Data Protection Appliance IDPA፣ 2023R3 Avamar Platform OS Security Patch Rollup፣2023፣3 የስርዓተ ክወና የደህንነት መጠገኛ ጥቅል፣ ደህንነት Patch Rollup፣ Patch Rollup |

