DSA-2020-218: Dell EMC Data Protection Central Security Update for Multiple Third-Party Component Vulnerabilities
Impact
Critical
Details
Multiple components within Dell EMC Data Protection Central require a security update to address various vulnerabilities.
| Third-party Component | CVE(s) | More Information |
| libxerces-c-3_1=3.1.1-13.3.6 | CVE-2017-12627 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| libX11-6=1.6.2-12.12.1 libX11-data=1.6.2-12.12.1 |
CVE-2018-14598 | |
| CVE-2018-14599 | ||
| CVE-2018-14600 | ||
| CVE-2020-14344 | ||
| bind-libs=9.9.9P1-63.17.1 bind-utils=9.9.9P1-63.17.1 |
CVE-2018-5741 | |
| CVE-2020-8616 | ||
| CVE-2020-8617 | ||
| ntp= 4.2.8p15-88.1 | CVE-2018-8956 | |
| CVE-2020-13817 | ||
| CVE-2020-15025 | ||
| CVE-2020-11868 | ||
| libgcc_s1= 9.2.1+r275327-1.3.9 libstdc++6= 9.2.1+r275327-1.3.9 libstdc++6= 9.3.1+git1296-1.7.2 |
CVE-2019-14250 | |
| CVE-2019-15847 | ||
| kernel-default=4.4.121-92.138.1 | CVE-2019-20810 | |
| CVE-2019-20812 | ||
| CVE-2020-0305 | ||
| CVE-2020-10135 | ||
| CVE-2020-10711 | ||
| CVE-2020-10751 | ||
| CVE-2020-10766 | ||
| CVE-2020-10767 | ||
| CVE-2020-10768 | ||
| CVE-2020-10773 | ||
| CVE-2020-12771 | ||
| CVE-2020-13974 | ||
| CVE-2020-14416 | ||
| grub2=2.02~beta2-115.52.1 grub2-i386-pc=2.02~beta2-115.52.1 grub2-snapper-plugin=2.02~beta2-115.52.1 grub2-systemd-sleep-plugin=2.02~beta2-115.52.1 |
CVE-2020-10713 | |
| CVE-2020-14308 | ||
| CVE-2020-15705 | ||
| CVE-2020-15706 | ||
| CVE-2020-15707 | ||
| libfreebl3=3.53.1-58.48.1 libsoftokn3=3.53.1-58.48.1 mozilla-nss=3.53.1-58.48.1 mozilla-nss-certs=3.53.1-58.48.1 |
CVE-2020-12399 | |
| CVE-2020-12402 | ||
| libxslt-tools libxslt1 |
CVE-2019-11068 | |
| CVE-2019-13117 | ||
| CVE-2019-13118 | ||
| CVE-2019-18197 | ||
| openldap2=2.4.41-18.71.2 | CVE-2015-1545 | |
| CVE-2015-1546 | ||
| CVE-2015-6908 | ||
| CVE-2017-17740 | ||
| CVE-2019-13057 | ||
| CVE-2017-17740 | ||
| CVE-2019-13565 | ||
| CVE-2020-12243 | ||
| CVE-2020-8023 |
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm.
To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search.
| Third-party Component | CVE(s) | More Information |
| libxerces-c-3_1=3.1.1-13.3.6 | CVE-2017-12627 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| libX11-6=1.6.2-12.12.1 libX11-data=1.6.2-12.12.1 |
CVE-2018-14598 | |
| CVE-2018-14599 | ||
| CVE-2018-14600 | ||
| CVE-2020-14344 | ||
| bind-libs=9.9.9P1-63.17.1 bind-utils=9.9.9P1-63.17.1 |
CVE-2018-5741 | |
| CVE-2020-8616 | ||
| CVE-2020-8617 | ||
| ntp= 4.2.8p15-88.1 | CVE-2018-8956 | |
| CVE-2020-13817 | ||
| CVE-2020-15025 | ||
| CVE-2020-11868 | ||
| libgcc_s1= 9.2.1+r275327-1.3.9 libstdc++6= 9.2.1+r275327-1.3.9 libstdc++6= 9.3.1+git1296-1.7.2 |
CVE-2019-14250 | |
| CVE-2019-15847 | ||
| kernel-default=4.4.121-92.138.1 | CVE-2019-20810 | |
| CVE-2019-20812 | ||
| CVE-2020-0305 | ||
| CVE-2020-10135 | ||
| CVE-2020-10711 | ||
| CVE-2020-10751 | ||
| CVE-2020-10766 | ||
| CVE-2020-10767 | ||
| CVE-2020-10768 | ||
| CVE-2020-10773 | ||
| CVE-2020-12771 | ||
| CVE-2020-13974 | ||
| CVE-2020-14416 | ||
| grub2=2.02~beta2-115.52.1 grub2-i386-pc=2.02~beta2-115.52.1 grub2-snapper-plugin=2.02~beta2-115.52.1 grub2-systemd-sleep-plugin=2.02~beta2-115.52.1 |
CVE-2020-10713 | |
| CVE-2020-14308 | ||
| CVE-2020-15705 | ||
| CVE-2020-15706 | ||
| CVE-2020-15707 | ||
| libfreebl3=3.53.1-58.48.1 libsoftokn3=3.53.1-58.48.1 mozilla-nss=3.53.1-58.48.1 mozilla-nss-certs=3.53.1-58.48.1 |
CVE-2020-12399 | |
| CVE-2020-12402 | ||
| libxslt-tools libxslt1 |
CVE-2019-11068 | |
| CVE-2019-13117 | ||
| CVE-2019-13118 | ||
| CVE-2019-18197 | ||
| openldap2=2.4.41-18.71.2 | CVE-2015-1545 | |
| CVE-2015-1546 | ||
| CVE-2015-6908 | ||
| CVE-2017-17740 | ||
| CVE-2019-13057 | ||
| CVE-2017-17740 | ||
| CVE-2019-13565 | ||
| CVE-2020-12243 | ||
| CVE-2020-8023 |
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm.
To search for a particular CVE, use the database s search utility at http://web.nvd.nist.gov/view/vuln/search.
Affected Products & Remediation
Affected products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, and 19.3
Dell EMC IDPA System Manager version 18.1, 18.2, and 19.2
Dell EMC Integrated Data Protection Appliance (IDPA) version 2.6
Remediation:
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see KB article 522157: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions. (Only registered Dell Customers can access the content on the article link via Dell.com/support)
Dell EMC recommends all customers upgrade at the earliest opportunity.
Affected products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, and 19.3
Dell EMC IDPA System Manager version 18.1, 18.2, and 19.2
Dell EMC Integrated Data Protection Appliance (IDPA) version 2.6
Remediation:
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see KB article 522157: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions. (Only registered Dell Customers can access the content on the article link via Dell.com/support)
Dell EMC recommends all customers upgrade at the earliest opportunity.