{"id":17963,"date":"2021-04-29T11:14:02","date_gmt":"2021-04-29T09:14:02","guid":{"rendered":"https:\/\/info.gwdg.de\/news\/?p=17963"},"modified":"2021-04-29T11:14:02","modified_gmt":"2021-04-29T09:14:02","slug":"sicherheitsluecke-tsm-programmen","status":"publish","type":"post","link":"https:\/\/info.gwdg.de\/news\/sicherheitsluecke-tsm-programmen\/","title":{"rendered":"Sicherheitsl\u00fccke: TSM-Programmen"},"content":{"rendered":"<p><strong>Meldungsnummer:<\/strong> 202104291111<br \/>\n<strong>Zeitraum:<\/strong> 28.04.2021 19:51<br \/>\n<strong>Betroffen:\u00a0<\/strong>TSM-Programme<br \/>\n<strong>Auswirkungen:\u00a0<\/strong>Sicherheitsl\u00fccke<\/p>\n<p>IBM hat in den TSM-Programmen eine massive Sicherheitsl\u00fccke entdeckt:<br \/>\n<a href=\"https:\/\/heise.de\/-6030379\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">https:\/\/heise.de\/-6030379<\/a><\/p>\n<p>Wir raten dringend das Update auf die neueste Version durchzuf\u00fchren, betroffen sind schlie\u00dflich\u00a0<span class=\"copyonly\">*<\/span><strong>alle<\/strong><span class=\"copyonly\">*<\/span>\u00a0Versionen vor 8.1.12.<\/p>\n<p>* Linux \/ RPM:<br \/>\n<a href=\"http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86\/BA\/v8112\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86\/BA\/v8112\/<\/a><\/p>\n<p>* Debian \/ Ubuntu<br \/>\n<a href=\"http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86_DEB\/BA\/v8112\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86_DEB\/BA\/v8112\/<\/a><\/p>\n<p>* Windows (nur 64Bit)<br \/>\n<a href=\"http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Windows\/x64\/v8112\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Windows\/x64\/v8112\/<\/a><\/p>\n<p>* MacOS<br \/>\n<a href=\"http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Mac\/v8112\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Mac\/v8112\/<\/a><\/p>\n<p>Neben den BA-Clients sind auch die Zusatzpakete wie z.B. TSM4Mail, TSM4VE, TSM4DP betroffen. Die Pakete sind nur im Softwareportal (&#8222;Passport Advantage Online)&#8220; der IBM verf\u00fcgbar &#8212; oder sprechen Sie uns bei Bedarf an.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meldungsnummer: 202104291111 Zeitraum: 28.04.2021 19:51 Betroffen:\u00a0TSM-Programme Auswirkungen:\u00a0Sicherheitsl\u00fccke IBM hat in den TSM-Programmen eine massive Sicherheitsl\u00fccke entdeckt: https:\/\/heise.de\/-6030379 Wir raten dringend das Update auf die neueste Version durchzuf\u00fchren, betroffen sind schlie\u00dflich\u00a0*alle*\u00a0Versionen vor 8.1.12. * Linux \/ RPM: http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86\/BA\/v8112\/ * Debian \/ Ubuntu http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Linux\/LinuxX86_DEB\/BA\/v8112\/ * Windows (nur 64Bit) http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Windows\/x64\/v8112\/ * MacOS http:\/\/ftp.software.ibm.com\/storage\/tivoli-storage-management\/maintenance\/client\/v8r1\/Mac\/v8112\/ Neben den BA-Clients sind auch &#8230; <a title=\"Sicherheitsl\u00fccke: TSM-Programmen\" class=\"read-more\" href=\"https:\/\/info.gwdg.de\/news\/sicherheitsluecke-tsm-programmen\/\" aria-label=\"Mehr Informationen \u00fcber Sicherheitsl\u00fccke: TSM-Programmen\">Weiterlesen<\/a><\/p>\n","protected":false},"author":109,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,3],"tags":[],"class_list":["post-17963","post","type-post","status-publish","format-standard","hentry","category-betriebsmeldungen","category-sicherheit"],"_links":{"self":[{"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/posts\/17963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/comments?post=17963"}],"version-history":[{"count":4,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/posts\/17963\/revisions"}],"predecessor-version":[{"id":17967,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/posts\/17963\/revisions\/17967"}],"wp:attachment":[{"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/media?parent=17963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/categories?post=17963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/info.gwdg.de\/news\/wp-json\/wp\/v2\/tags?post=17963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}