DSA-2020-173: Dell EMC Data Protection Central Security Update for Multiple Third Party Component Vulnerabilities

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Critical

Details

Summary:     
Multiple components within Dell EMC Data Protection Central require a security update to address various vulnerabilities.

Third-party Component CVE(s) More information
Curl CVE-2020-8177 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
Java-1_8_0-openjdk
Java-1_8_0-openjdk-headless
CVE-2020-2754 Intel-SA-00220 
CVE-2020-2755
CVE-2020-2756
CVE-2020-2757
CVE-2020-2773
CVE-2020-2781
CVE-2020-2800
CVE-2020-2803
CVE-2020-2805
CVE-2020-2830
Kernel-default CVE-2020-10757 05433See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-12656
CVE-2020-12652
CVE-2020-0543
CVE-2020-12653
CVE-2020-12654
CVE-2020-12114
CVE-2020-11609
CVE-2020-10720
CVE-2020-10690
CVE-2020-9458
CVE-2020-3701
CVE-2020-10942
CVE-2020-12188
CVE-2020-18255
Libadns1 CVE-2017-9103  
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
Libcurl4 CVE-2020-8177 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Libldap-2_4-2 CVE-2020-12243  
CVE-2019-13565
CVE-2019-13057
CVE-2017-17740
libopenssl1_0_0
libowb1_0_0
openssl
CVE-2019-1551  
Libpython2_7-1_0 CVE-2019-18348  
libruby2_1-2_1
ruby2.1
ruby2.1-stdlib
CVE-2020-10663  
CVE-2019-16201
CVE-2019-15845
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2018-16396
CVE-2018-16395
libruby2_1-2_1
ruby2.1
ruby2.1-stdlib
CVE-2018-6914  
CVE-2018-8779
CVE-2018-8780
CVE-2018-8777
CVE-2018-8778
CVE-2018-1000079
CVE-2018-1000075
CVE-2018-1000078
CVE-2018-1000077
CVE-2018-1000076
CVE-2018-1000074
CVE-2018-1000073
CVE-2017-17790
CVE-2017-9229
CVE-2017-9228
CVE-2017-0903
CVE-2017-14033
CVE-2017-0898
CVE-2017-10784
CVE-2017-14064
CVE-2016-7798
CVE-2015-9096
CVE-2017-0899
libstdc++6 CVE-2019-15847  
CVE-2019-14250
openldap2 CVE-2020-12243  
CVE-2019-13565
CVE-2019-13057
CVE-2017-17740
Perl
Perl-base
CVE-2020-10543  
CVE-2020-10878
CVE-2020-12723
Python-base
Python-xml
CVE-2019-18348  
Vim
Vim-data
CVE-2019-20807  

Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm

To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search
Third-party Component CVE(s) More information
Curl CVE-2020-8177 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
Java-1_8_0-openjdk
Java-1_8_0-openjdk-headless
CVE-2020-2754 Intel-SA-00220 
CVE-2020-2755
CVE-2020-2756
CVE-2020-2757
CVE-2020-2773
CVE-2020-2781
CVE-2020-2800
CVE-2020-2803
CVE-2020-2805
CVE-2020-2830
Kernel-default CVE-2020-10757 05433See NVD (http://nvd.nist.gov/) for individual scores for each CVE
CVE-2020-12656
CVE-2020-12652
CVE-2020-0543
CVE-2020-12653
CVE-2020-12654
CVE-2020-12114
CVE-2020-11609
CVE-2020-10720
CVE-2020-10690
CVE-2020-9458
CVE-2020-3701
CVE-2020-10942
CVE-2020-12188
CVE-2020-18255
Libadns1 CVE-2017-9103  
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
Libcurl4 CVE-2020-8177 See NVD (http://nvd.nist.gov/) for individual scores for each CVE
Libldap-2_4-2 CVE-2020-12243  
CVE-2019-13565
CVE-2019-13057
CVE-2017-17740
libopenssl1_0_0
libowb1_0_0
openssl
CVE-2019-1551  
Libpython2_7-1_0 CVE-2019-18348  
libruby2_1-2_1
ruby2.1
ruby2.1-stdlib
CVE-2020-10663  
CVE-2019-16201
CVE-2019-15845
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2018-16396
CVE-2018-16395
libruby2_1-2_1
ruby2.1
ruby2.1-stdlib
CVE-2018-6914  
CVE-2018-8779
CVE-2018-8780
CVE-2018-8777
CVE-2018-8778
CVE-2018-1000079
CVE-2018-1000075
CVE-2018-1000078
CVE-2018-1000077
CVE-2018-1000076
CVE-2018-1000074
CVE-2018-1000073
CVE-2017-17790
CVE-2017-9229
CVE-2017-9228
CVE-2017-0903
CVE-2017-14033
CVE-2017-0898
CVE-2017-10784
CVE-2017-14064
CVE-2016-7798
CVE-2015-9096
CVE-2017-0899
libstdc++6 CVE-2019-15847  
CVE-2019-14250
openldap2 CVE-2020-12243  
CVE-2019-13565
CVE-2019-13057
CVE-2017-17740
Perl
Perl-base
CVE-2020-10543  
CVE-2020-10878
CVE-2020-12723
Python-base
Python-xml
CVE-2019-18348  
Vim
Vim-data
CVE-2019-20807  

Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm

To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Affected products:    
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, and 19.3
Dell EMC Integrated Data Protection Appliance (IDPA) System Manager version 18.1, 18.2, and 19.2


Remediation:  
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.

To upgrade your Dell EMC Data Protection Central system, see KB article 522157: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.  (Only registered Dell Customers can access the content on the article link via Dell.com/support)

Dell EMC recommends all customers upgrade at the earliest opportunity.



Affected products:    
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, and 19.3
Dell EMC Integrated Data Protection Appliance (IDPA) System Manager version 18.1, 18.2, and 19.2


Remediation:  
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.

To upgrade your Dell EMC Data Protection Central system, see KB article 522157: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.  (Only registered Dell Customers can access the content on the article link via Dell.com/support)

Dell EMC recommends all customers upgrade at the earliest opportunity.



Related Information

Affected Products

Data Protection Central

Products

Data Protection Central, Integrated Data Protection Appliance Software, Product Security Information
Article Properties
Article Number: 000153598
Article Type: Dell Security Advisory
Last Modified: 19 Sept 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.