Dell Avamar Platform OS Security Patch Rollup 2023R3 Release Notes
Revision: Rev. 01
Date: October 2023
Company: Dell Inc.
These release notes provide supplemental information about the Avamar OS security patch rollup and list common vulnerabilities and exposures (CVEs) addressed in 2023R3. For CVEs pertaining to 2019R4 and earlier rollups, refer to the Avamar Platform OS Security Patch Rollup Release Notes.
Revision History
Revision | Date | Description |
---|---|---|
01 | October, 2023 | First release of this document for 2023R3. |
Avamar Platform OS Security Patch Rollup
The Avamar platform OS security patch rollup automates the application of security and operating system updates released between scheduled Avamar server software releases. These notes list the common vulnerabilities and exposures (CVEs) addressed by each security patch.
The security patches apply to the following products:
- Avamar server
- Avamar combined proxy
- Avamar Virtual Edition (AVE)
- Avamar Data Store (ADS)
- Avamar NDMP accelerator node
- NetWorker Virtual Edition (NVE)
- PowerProtect DP Series Appliance/Integrated Data Protection Appliance (IDPA)
This rollup also updates the following third-party components, if present:
- Java Runtime Environment (JRE)
- Apache Tomcat
- BSAFE OwB FIPS package
Clean /boot Volume Procedure
This section details the procedure to free space on the server's /boot
volume when applying the OS security patch rollup on ADS.
NOTE: To ensure all nodes in a multi-node server have the required free space on the /boot
volume, perform this procedure on the utility node, all storage nodes, spare nodes, and accelerator nodes (if applicable).
NOTE: When manually applying the Security Rollup, the required free space on the /boot
volume is 80MB. When applying via avinstaller
, the required free space may differ between releases. Refer to Table 2 for specific requirements.
Free Space Targets
Rollup version | Free space target |
---|---|
2022R1 and later | NA |
Steps
- Open a command shell and log in. Use one of the following methods:
- For a single-node server: Log in as admin, then switch user to root using
su -
. - For a multi-node server: Log in to the utility node as admin, then switch user to root using
su -
.
- For a single-node server: Log in as admin, then switch user to root using
- Check the size and free space on the
/boot
volume by typing:df -h /boot/
. Verify if the volume meets the free space target. - Check for
*-kdump
files on the/boot
volume by typing:ls -l /boot/*kdump
. - Remove kdump files from the
/boot
volume by typing:rm /boot/*kdump
. - List installed kernels by typing:
rpm -qa | grep kernel-default
. - Display the running kernel version by typing:
uname -a
. - Identify any old kernels from the list of installed kernels, excluding the running kernel version.
- If old kernels are present, remove them by typing:
rpm -ev kernel-default-VERSION_OLD kernel-default-base-VERSION_OLD
. - Re-check the installed and running kernel for any old kernel files in
/boot
. If present, remove them manually. - Check for archived
.gz
files on the/boot
volume by typing:ls -l /boot/*.gz
. - If necessary, remove any archived
.gz
files from the/boot
volume by typing:rm /boot/*.gz
. - If the space on the
/boot
volume is still insufficient (less than 80MB for manual installation), back up and remove the running kernel:- Create a backup directory:
mkdir /usr/local/avamar/var/rollup_bak
- Move kernel files:
mv /boot/*VERSION_NEW* /usr/local/avamar/var/rollup_bak
NOTE: After the security rollup installation is complete, restore the running kernel files by following step 14.
- Create a backup directory:
- Check the size and free space on the
/boot
volume again by typing:df -h /boot/
. - For manual installation, after rollup installation is complete, restore the running kernel (if backed up in step 12) by typing:
mv /usr/local/avamar/var/rollup_bak/*-default /boot
and thenrm -r /usr/local/avamar/var/rollup_bak
.
2023R3 CVEs
This release contains patches for numerous Common Vulnerabilities and Exposures (CVEs) across various Dell Avamar platform components and SUSE Linux Enterprise Server (SLES) versions, including:
- Avamar server on SLES 12 SP5
- Avamar combined proxy on SLES 12 SP5
- NetWorker Virtual Edition (NVE) on SLES 12 SP5
- Avamar Data Store (ADS) Gen5A NDMP accelerator node on SLES 12 SP5
The document lists a comprehensive set of CVEs addressed by this patch. Due to the extensive nature of these lists, they are not reproduced here. Please refer to the original release notes for the complete details of all applicable CVEs.
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.