DSA-2020-273: Dell EMC Data Protection Central Security Update for Multiple Third Party Component Vulnerabilities
Summary: Multiple components within Dell EMC Data Protection Central require a security update to address various vulnerabilities.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
| Third-party Component | CVE(s) | More Information |
| perl-DBI=1.628-5.6.1 | CVE-2013-7490 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2019-20919 | ||
| CVE-2020-14392 | ||
| CVE-2020-14393 | ||
libldap-2_4-2=2.4.41-18.74.1 openldap2-client=2.4.41-18.74.1 openldap2=2.4.41-18.74.1 |
CVE-2015-1545 | |
| CVE-2015-1546 | ||
| CVE-2015-6908 | ||
| CVE-2017-17740 | ||
| CVE-2017-9287 | ||
| CVE-2019-13057 | ||
| CVE-2019-13565 | ||
| CVE-2020-12243 | ||
| CVE-2020-8023 | ||
| bind-libs=9.9.9P1-63.17.1 bind-utils=9.9.9P1-63.17.1 |
CVE-2018-5741 | |
| CVE-2020-8616 | ||
| CVE-2020-8616 | ||
| ntp= 4.2.8p15-88.1 | CVE-2018-8956 | |
| CVE-2020-11868 | ||
| CVE-2020-13817 | ||
| CVE-2020-15025 | ||
| libgcc_s1= 9.2.1+r275327-1.3.9 libstdc++6= 9.2.1+r275327-1.3.9 libstdc++6= 9.3.1+git1296-1.7.2 |
CVE-2019-14250 | |
| CVE-2019-15847 | ||
kernel-default=4.4.121-92.141.1 |
CVE-2017-12188 | |
| CVE-2017-18255 | ||
| CVE-2019-16746 | ||
| CVE-2019-20810 | ||
| CVE-2019-20812 | ||
| CVE-2019-3701 | ||
| CVE-2019-9455 | ||
| CVE-2019-9458 | ||
| CVE-2020-0305 | ||
kernel-default=4.4.121-92.141.1 |
CVE-2020-0543 | |
| CVE-2020-10135 | ||
| CVE-2020-10690 | ||
| CVE-2020-10711 | ||
| CVE-2020-10720 | ||
| CVE-2020-10732 | ||
| CVE-2020-10751 | ||
| CVE-2020-10757 | ||
| CVE-2020-10766 | ||
| CVE-2020-10767 | ||
| CVE-2020-10768 | ||
| CVE-2020-10773 | ||
| CVE-2020-10942 | ||
| CVE-2020-11494 | ||
| CVE-2020-11608 | ||
| CVE-2020-11609 | ||
| CVE-2020-12114 | ||
| CVE-2020-12652 | ||
| CVE-2020-12653 | ||
| CVE-2020-12654 | ||
| CVE-2020-12656 | ||
| CVE-2020-12771 | ||
| CVE-2020-13974 | ||
| CVE-2020-14314 | ||
| CVE-2020-14331 | ||
| CVE-2020-14416 | ||
| CVE-2020-16166 | ||
| grub2=2.02~beta2-115.52.1 grub2-i386-pc=2.02~beta2-115.52.1 grub2-snapper-plugin=2.02~beta2-115.52.1 grub2-systemd-sleep-plugin=2.02~beta2-115.52.1 |
CVE-2020-10713 | |
| CVE-2020-14308 | ||
| CVE-2020-15705 | ||
| CVE-2020-15706 | ||
| CVE-2020-15707 | ||
| libfreebl3=3.53.1-58.48.1 libsoftokn3=3.53.1-58.48.1 mozilla-nss=3.53.1-58.48.1 mozilla-nss-certs=3.53.1-58.48.1 |
CVE-2020-12399 | |
| CVE-2020-12402 | ||
| libxslt-tools=1.1.28-17.9.1 libxslt1=1.1.28-17.9.1 |
CVE-2019-11068 | |
| CVE-2019-13117 | ||
| CVE-2019-13118 | ||
| CVE-2019-18197 | ||
libruby2_1-2_1=2.1.9-19.3.2 ruby2.1=2.1.9-19.3.2 ruby2.1-stdlib=2.1.9-19.3.2 |
CVE-2015-9096 | |
| CVE-2016-7798 | ||
| CVE-2017-0898 | ||
| CVE-2017-0899 | ||
| CVE-2017-0903 | ||
| CVE-2017-10784 | ||
| CVE-2017-14033 | ||
| CVE-2017-14064 | ||
| CVE-2017-17790 | ||
libruby2_1-2_1=2.1.9-19.3.2 ruby2.1=2.1.9-19.3.2 ruby2.1-stdlib=2.1.9-19.3.2 |
CVE-2017-9228 | |
| CVE-2017-9229 | ||
| CVE-2018-1000073 | ||
| CVE-2018-1000074 | ||
| CVE-2018-1000075 | ||
| CVE-2018-1000076 | ||
| CVE-2018-1000077 | ||
| CVE-2018-1000078 | ||
| CVE-2018-1000079 | ||
| CVE-2018-16395 | ||
| CVE-2018-16396 | ||
| CVE-2018-6914 | ||
| CVE-2018-8777 | ||
| CVE-2018-8778 | ||
| CVE-2018-8779 | ||
| CVE-2018-8780 | ||
| CVE-2019-15845 | ||
| CVE-2019-16201 | ||
| CVE-2019-16254 | ||
| CVE-2019-16255 | ||
| CVE-2019-8320 | ||
| CVE-2019-8321 | ||
| CVE-2019-8322 | ||
| CVE-2019-8323 | ||
| CVE-2019-8324 | ||
| CVE-2019-8325 | ||
| CVE-2020-10663 | ||
| libxerces-c-3_1=3.1.1-13.3.6 | CVE-2017-12627 | |
| libadns1=1.4-103.3.1 | CVE-2017-9103 | |
| CVE-2017-9104 | ||
| CVE-2017-9105 | ||
| CVE-2017-9106 | ||
| CVE-2017-9107 | ||
| CVE-2017-9108 | ||
| CVE-2017-9109 | ||
| libX11-6=1.6.2-12.12.1 libX11-data=1.6.2-12.12.1 |
CVE-2018-14598 | |
| CVE-2018-14599 | ||
| CVE-2018-14600 | ||
| CVE-2020-14344 | ||
| libopenssl1_0_0=1.0.2j-60.60.1 libowb1_0_0=1.3.5.0-1 openssl=1.0.2j-60.60.1 |
CVE-2019-1551 | |
| libpython3_4m1_0=3.4.10-25.52.1 python3=3.4.10-25.52.1 python3-base=3.4.10-25.52.1 |
CVE-2019-16935 | |
| CVE-2019-18348 | ||
| CVE-2019-20907 | ||
| CVE-2019-9947 | ||
| CVE-2020-14422 | ||
| libpython2_7-1_0=2.7.17-28.45.1 python-base=2.7.17-28.45.1 python-xml=2.7.17-28.45.1 |
CVE-2019-18348 | |
| CVE-2019-9947 | ||
| vim=7.4.326-17.6.1 vim-data=7.4.326-17.6.1 |
CVE-2019-20807 | |
| glibc=2.22-113.4 glibc-i18ndata=2.22-113.4 glibc-locale=2.22-113.4 |
CVE-2020-10029 | |
| perl=5.18.2-12.23.1 perl-base=5.18.2-12.23.1 |
CVE-2020-10543 | |
| CVE-2020-10878 | ||
| CVE-2020-12723 | ||
| libfreetype6=2.6.3-7.18.1 | CVE-2020-15999 | |
| libproxy1=0.4.13-18.3.1 | CVE-2020-25219 | |
| CVE-2020-26154 | ||
| java-1_8_0-openjdk-headless=1.8.0.252-27.45.6 java-1_8_0-openjdk=1.8.0.252-27.45.6 |
CVE-2020-2754 | |
| CVE-2020-2755 | ||
| CVE-2020-2756 | ||
| CVE-2020-2757 | ||
| CVE-2020-2773 | ||
| CVE-2020-2781 | ||
| CVE-2020-2800 | ||
| CVE-2020-2803 | ||
| CVE-2020-2805 | ||
| CVE-2020-2830 | ||
| curl=7.37.0-37.47.1 libcurl4=7.37.0-37.47.1 |
CVE-2020-8177 |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Dell EMC recommends all customers upgrade at the earliest opportunity.
| Third-party Component | CVE(s) | More Information |
| perl-DBI=1.628-5.6.1 | CVE-2013-7490 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2019-20919 | ||
| CVE-2020-14392 | ||
| CVE-2020-14393 | ||
libldap-2_4-2=2.4.41-18.74.1 openldap2-client=2.4.41-18.74.1 openldap2=2.4.41-18.74.1 |
CVE-2015-1545 | |
| CVE-2015-1546 | ||
| CVE-2015-6908 | ||
| CVE-2017-17740 | ||
| CVE-2017-9287 | ||
| CVE-2019-13057 | ||
| CVE-2019-13565 | ||
| CVE-2020-12243 | ||
| CVE-2020-8023 | ||
| bind-libs=9.9.9P1-63.17.1 bind-utils=9.9.9P1-63.17.1 |
CVE-2018-5741 | |
| CVE-2020-8616 | ||
| CVE-2020-8616 | ||
| ntp= 4.2.8p15-88.1 | CVE-2018-8956 | |
| CVE-2020-11868 | ||
| CVE-2020-13817 | ||
| CVE-2020-15025 | ||
| libgcc_s1= 9.2.1+r275327-1.3.9 libstdc++6= 9.2.1+r275327-1.3.9 libstdc++6= 9.3.1+git1296-1.7.2 |
CVE-2019-14250 | |
| CVE-2019-15847 | ||
kernel-default=4.4.121-92.141.1 |
CVE-2017-12188 | |
| CVE-2017-18255 | ||
| CVE-2019-16746 | ||
| CVE-2019-20810 | ||
| CVE-2019-20812 | ||
| CVE-2019-3701 | ||
| CVE-2019-9455 | ||
| CVE-2019-9458 | ||
| CVE-2020-0305 | ||
kernel-default=4.4.121-92.141.1 |
CVE-2020-0543 | |
| CVE-2020-10135 | ||
| CVE-2020-10690 | ||
| CVE-2020-10711 | ||
| CVE-2020-10720 | ||
| CVE-2020-10732 | ||
| CVE-2020-10751 | ||
| CVE-2020-10757 | ||
| CVE-2020-10766 | ||
| CVE-2020-10767 | ||
| CVE-2020-10768 | ||
| CVE-2020-10773 | ||
| CVE-2020-10942 | ||
| CVE-2020-11494 | ||
| CVE-2020-11608 | ||
| CVE-2020-11609 | ||
| CVE-2020-12114 | ||
| CVE-2020-12652 | ||
| CVE-2020-12653 | ||
| CVE-2020-12654 | ||
| CVE-2020-12656 | ||
| CVE-2020-12771 | ||
| CVE-2020-13974 | ||
| CVE-2020-14314 | ||
| CVE-2020-14331 | ||
| CVE-2020-14416 | ||
| CVE-2020-16166 | ||
| grub2=2.02~beta2-115.52.1 grub2-i386-pc=2.02~beta2-115.52.1 grub2-snapper-plugin=2.02~beta2-115.52.1 grub2-systemd-sleep-plugin=2.02~beta2-115.52.1 |
CVE-2020-10713 | |
| CVE-2020-14308 | ||
| CVE-2020-15705 | ||
| CVE-2020-15706 | ||
| CVE-2020-15707 | ||
| libfreebl3=3.53.1-58.48.1 libsoftokn3=3.53.1-58.48.1 mozilla-nss=3.53.1-58.48.1 mozilla-nss-certs=3.53.1-58.48.1 |
CVE-2020-12399 | |
| CVE-2020-12402 | ||
| libxslt-tools=1.1.28-17.9.1 libxslt1=1.1.28-17.9.1 |
CVE-2019-11068 | |
| CVE-2019-13117 | ||
| CVE-2019-13118 | ||
| CVE-2019-18197 | ||
libruby2_1-2_1=2.1.9-19.3.2 ruby2.1=2.1.9-19.3.2 ruby2.1-stdlib=2.1.9-19.3.2 |
CVE-2015-9096 | |
| CVE-2016-7798 | ||
| CVE-2017-0898 | ||
| CVE-2017-0899 | ||
| CVE-2017-0903 | ||
| CVE-2017-10784 | ||
| CVE-2017-14033 | ||
| CVE-2017-14064 | ||
| CVE-2017-17790 | ||
libruby2_1-2_1=2.1.9-19.3.2 ruby2.1=2.1.9-19.3.2 ruby2.1-stdlib=2.1.9-19.3.2 |
CVE-2017-9228 | |
| CVE-2017-9229 | ||
| CVE-2018-1000073 | ||
| CVE-2018-1000074 | ||
| CVE-2018-1000075 | ||
| CVE-2018-1000076 | ||
| CVE-2018-1000077 | ||
| CVE-2018-1000078 | ||
| CVE-2018-1000079 | ||
| CVE-2018-16395 | ||
| CVE-2018-16396 | ||
| CVE-2018-6914 | ||
| CVE-2018-8777 | ||
| CVE-2018-8778 | ||
| CVE-2018-8779 | ||
| CVE-2018-8780 | ||
| CVE-2019-15845 | ||
| CVE-2019-16201 | ||
| CVE-2019-16254 | ||
| CVE-2019-16255 | ||
| CVE-2019-8320 | ||
| CVE-2019-8321 | ||
| CVE-2019-8322 | ||
| CVE-2019-8323 | ||
| CVE-2019-8324 | ||
| CVE-2019-8325 | ||
| CVE-2020-10663 | ||
| libxerces-c-3_1=3.1.1-13.3.6 | CVE-2017-12627 | |
| libadns1=1.4-103.3.1 | CVE-2017-9103 | |
| CVE-2017-9104 | ||
| CVE-2017-9105 | ||
| CVE-2017-9106 | ||
| CVE-2017-9107 | ||
| CVE-2017-9108 | ||
| CVE-2017-9109 | ||
| libX11-6=1.6.2-12.12.1 libX11-data=1.6.2-12.12.1 |
CVE-2018-14598 | |
| CVE-2018-14599 | ||
| CVE-2018-14600 | ||
| CVE-2020-14344 | ||
| libopenssl1_0_0=1.0.2j-60.60.1 libowb1_0_0=1.3.5.0-1 openssl=1.0.2j-60.60.1 |
CVE-2019-1551 | |
| libpython3_4m1_0=3.4.10-25.52.1 python3=3.4.10-25.52.1 python3-base=3.4.10-25.52.1 |
CVE-2019-16935 | |
| CVE-2019-18348 | ||
| CVE-2019-20907 | ||
| CVE-2019-9947 | ||
| CVE-2020-14422 | ||
| libpython2_7-1_0=2.7.17-28.45.1 python-base=2.7.17-28.45.1 python-xml=2.7.17-28.45.1 |
CVE-2019-18348 | |
| CVE-2019-9947 | ||
| vim=7.4.326-17.6.1 vim-data=7.4.326-17.6.1 |
CVE-2019-20807 | |
| glibc=2.22-113.4 glibc-i18ndata=2.22-113.4 glibc-locale=2.22-113.4 |
CVE-2020-10029 | |
| perl=5.18.2-12.23.1 perl-base=5.18.2-12.23.1 |
CVE-2020-10543 | |
| CVE-2020-10878 | ||
| CVE-2020-12723 | ||
| libfreetype6=2.6.3-7.18.1 | CVE-2020-15999 | |
| libproxy1=0.4.13-18.3.1 | CVE-2020-25219 | |
| CVE-2020-26154 | ||
| java-1_8_0-openjdk-headless=1.8.0.252-27.45.6 java-1_8_0-openjdk=1.8.0.252-27.45.6 |
CVE-2020-2754 | |
| CVE-2020-2755 | ||
| CVE-2020-2756 | ||
| CVE-2020-2757 | ||
| CVE-2020-2773 | ||
| CVE-2020-2781 | ||
| CVE-2020-2800 | ||
| CVE-2020-2803 | ||
| CVE-2020-2805 | ||
| CVE-2020-2830 | ||
| curl=7.37.0-37.47.1 libcurl4=7.37.0-37.47.1 |
CVE-2020-8177 |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Dell EMC recommends all customers upgrade at the earliest opportunity.
Affected Products & Remediation
Affected Products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4
Dell EMC IDPA System Manager version 18.1, 18.2, 19.2
Remediation:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Dell EMC recommends all customers upgrade at the earliest opportunity.
Affected Products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4
Dell EMC IDPA System Manager version 18.1, 18.2, 19.2
Remediation:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
Dell EMC recommends all customers upgrade at the earliest opportunity.
Related Information
Legal Disclaimer
Affected Products
Data Protection CentralProducts
Data Protection CentralArticle Properties
Article Number: 000181249
Article Type: Dell Security Advisory
Last Modified: 22 May 2021
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.