DSA-2020-273: Dell EMC Data Protection Central Security Update for Multiple Third Party Component Vulnerabilities

Summary: Multiple components within Dell EMC Data Protection Central require a security update to address various vulnerabilities.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Critical

Details

 
Third-party Component CVE(s) More Information
perl-DBI=1.628-5.6.1 CVE-2013-7490 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
 
CVE-2019-20919
CVE-2020-14392
CVE-2020-14393

libldap-2_4-2=2.4.41-18.74.1
openldap2-client=2.4.41-18.74.1
openldap2=2.4.41-18.74.1
CVE-2015-1545
CVE-2015-1546
CVE-2015-6908
CVE-2017-17740
CVE-2017-9287
CVE-2019-13057
CVE-2019-13565
CVE-2020-12243
CVE-2020-8023
bind-libs=9.9.9P1-63.17.1
bind-utils=9.9.9P1-63.17.1
CVE-2018-5741
CVE-2020-8616
CVE-2020-8616
ntp= 4.2.8p15-88.1 CVE-2018-8956
CVE-2020-11868
CVE-2020-13817
CVE-2020-15025
libgcc_s1= 9.2.1+r275327-1.3.9
libstdc++6= 9.2.1+r275327-1.3.9
libstdc++6= 9.3.1+git1296-1.7.2
CVE-2019-14250
CVE-2019-15847

kernel-default=4.4.121-92.141.1
CVE-2017-12188
CVE-2017-18255
CVE-2019-16746
CVE-2019-20810
CVE-2019-20812
CVE-2019-3701
CVE-2019-9455
CVE-2019-9458
CVE-2020-0305

kernel-default=4.4.121-92.141.1
CVE-2020-0543
CVE-2020-10135
CVE-2020-10690
CVE-2020-10711
CVE-2020-10720
CVE-2020-10732
CVE-2020-10751
CVE-2020-10757
CVE-2020-10766
CVE-2020-10767
CVE-2020-10768
CVE-2020-10773
CVE-2020-10942
CVE-2020-11494
CVE-2020-11608
CVE-2020-11609
CVE-2020-12114
CVE-2020-12652
CVE-2020-12653
CVE-2020-12654
CVE-2020-12656
CVE-2020-12771
CVE-2020-13974
CVE-2020-14314
CVE-2020-14331
CVE-2020-14416
CVE-2020-16166
grub2=2.02~beta2-115.52.1
grub2-i386-pc=2.02~beta2-115.52.1
grub2-snapper-plugin=2.02~beta2-115.52.1
grub2-systemd-sleep-plugin=2.02~beta2-115.52.1
CVE-2020-10713
CVE-2020-14308
CVE-2020-15705
CVE-2020-15706
CVE-2020-15707
libfreebl3=3.53.1-58.48.1
libsoftokn3=3.53.1-58.48.1
mozilla-nss=3.53.1-58.48.1
mozilla-nss-certs=3.53.1-58.48.1
CVE-2020-12399
CVE-2020-12402
libxslt-tools=1.1.28-17.9.1
libxslt1=1.1.28-17.9.1
CVE-2019-11068
CVE-2019-13117
CVE-2019-13118
CVE-2019-18197

libruby2_1-2_1=2.1.9-19.3.2
ruby2.1=2.1.9-19.3.2
ruby2.1-stdlib=2.1.9-19.3.2
CVE-2015-9096
CVE-2016-7798
CVE-2017-0898
CVE-2017-0899
CVE-2017-0903
CVE-2017-10784
CVE-2017-14033
CVE-2017-14064
CVE-2017-17790

libruby2_1-2_1=2.1.9-19.3.2
ruby2.1=2.1.9-19.3.2
ruby2.1-stdlib=2.1.9-19.3.2
CVE-2017-9228
CVE-2017-9229
CVE-2018-1000073
CVE-2018-1000074
CVE-2018-1000075
CVE-2018-1000076
CVE-2018-1000077
CVE-2018-1000078
CVE-2018-1000079
CVE-2018-16395
CVE-2018-16396
CVE-2018-6914
CVE-2018-8777
CVE-2018-8778
CVE-2018-8779
CVE-2018-8780
CVE-2019-15845
CVE-2019-16201
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2020-10663
libxerces-c-3_1=3.1.1-13.3.6 CVE-2017-12627
libadns1=1.4-103.3.1 CVE-2017-9103
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
libX11-6=1.6.2-12.12.1
libX11-data=1.6.2-12.12.1
CVE-2018-14598
CVE-2018-14599
CVE-2018-14600
CVE-2020-14344
libopenssl1_0_0=1.0.2j-60.60.1
libowb1_0_0=1.3.5.0-1
openssl=1.0.2j-60.60.1
CVE-2019-1551
libpython3_4m1_0=3.4.10-25.52.1
python3=3.4.10-25.52.1
python3-base=3.4.10-25.52.1
CVE-2019-16935
CVE-2019-18348
CVE-2019-20907
CVE-2019-9947
CVE-2020-14422
libpython2_7-1_0=2.7.17-28.45.1
python-base=2.7.17-28.45.1
python-xml=2.7.17-28.45.1
CVE-2019-18348
CVE-2019-9947
vim=7.4.326-17.6.1
vim-data=7.4.326-17.6.1
CVE-2019-20807
glibc=2.22-113.4
glibc-i18ndata=2.22-113.4
glibc-locale=2.22-113.4
CVE-2020-10029
perl=5.18.2-12.23.1
perl-base=5.18.2-12.23.1
CVE-2020-10543
CVE-2020-10878
CVE-2020-12723
libfreetype6=2.6.3-7.18.1 CVE-2020-15999
libproxy1=0.4.13-18.3.1 CVE-2020-25219
CVE-2020-26154
java-1_8_0-openjdk-headless=1.8.0.252-27.45.6
java-1_8_0-openjdk=1.8.0.252-27.45.6
CVE-2020-2754
CVE-2020-2755
CVE-2020-2756
CVE-2020-2757
CVE-2020-2773
CVE-2020-2781
CVE-2020-2800
CVE-2020-2803
CVE-2020-2805
CVE-2020-2830
curl=7.37.0-37.47.1
libcurl4=7.37.0-37.47.1
CVE-2020-8177
 

Dell EMC creates and distributes the Data Protection Central OS Update.  These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

Dell EMC recommends all customers upgrade at the earliest opportunity.
 
Third-party Component CVE(s) More Information
perl-DBI=1.628-5.6.1 CVE-2013-7490 See NVD (http://nvd.nist.gov/) for individual scores for each CVE.
 
CVE-2019-20919
CVE-2020-14392
CVE-2020-14393

libldap-2_4-2=2.4.41-18.74.1
openldap2-client=2.4.41-18.74.1
openldap2=2.4.41-18.74.1
CVE-2015-1545
CVE-2015-1546
CVE-2015-6908
CVE-2017-17740
CVE-2017-9287
CVE-2019-13057
CVE-2019-13565
CVE-2020-12243
CVE-2020-8023
bind-libs=9.9.9P1-63.17.1
bind-utils=9.9.9P1-63.17.1
CVE-2018-5741
CVE-2020-8616
CVE-2020-8616
ntp= 4.2.8p15-88.1 CVE-2018-8956
CVE-2020-11868
CVE-2020-13817
CVE-2020-15025
libgcc_s1= 9.2.1+r275327-1.3.9
libstdc++6= 9.2.1+r275327-1.3.9
libstdc++6= 9.3.1+git1296-1.7.2
CVE-2019-14250
CVE-2019-15847

kernel-default=4.4.121-92.141.1
CVE-2017-12188
CVE-2017-18255
CVE-2019-16746
CVE-2019-20810
CVE-2019-20812
CVE-2019-3701
CVE-2019-9455
CVE-2019-9458
CVE-2020-0305

kernel-default=4.4.121-92.141.1
CVE-2020-0543
CVE-2020-10135
CVE-2020-10690
CVE-2020-10711
CVE-2020-10720
CVE-2020-10732
CVE-2020-10751
CVE-2020-10757
CVE-2020-10766
CVE-2020-10767
CVE-2020-10768
CVE-2020-10773
CVE-2020-10942
CVE-2020-11494
CVE-2020-11608
CVE-2020-11609
CVE-2020-12114
CVE-2020-12652
CVE-2020-12653
CVE-2020-12654
CVE-2020-12656
CVE-2020-12771
CVE-2020-13974
CVE-2020-14314
CVE-2020-14331
CVE-2020-14416
CVE-2020-16166
grub2=2.02~beta2-115.52.1
grub2-i386-pc=2.02~beta2-115.52.1
grub2-snapper-plugin=2.02~beta2-115.52.1
grub2-systemd-sleep-plugin=2.02~beta2-115.52.1
CVE-2020-10713
CVE-2020-14308
CVE-2020-15705
CVE-2020-15706
CVE-2020-15707
libfreebl3=3.53.1-58.48.1
libsoftokn3=3.53.1-58.48.1
mozilla-nss=3.53.1-58.48.1
mozilla-nss-certs=3.53.1-58.48.1
CVE-2020-12399
CVE-2020-12402
libxslt-tools=1.1.28-17.9.1
libxslt1=1.1.28-17.9.1
CVE-2019-11068
CVE-2019-13117
CVE-2019-13118
CVE-2019-18197

libruby2_1-2_1=2.1.9-19.3.2
ruby2.1=2.1.9-19.3.2
ruby2.1-stdlib=2.1.9-19.3.2
CVE-2015-9096
CVE-2016-7798
CVE-2017-0898
CVE-2017-0899
CVE-2017-0903
CVE-2017-10784
CVE-2017-14033
CVE-2017-14064
CVE-2017-17790

libruby2_1-2_1=2.1.9-19.3.2
ruby2.1=2.1.9-19.3.2
ruby2.1-stdlib=2.1.9-19.3.2
CVE-2017-9228
CVE-2017-9229
CVE-2018-1000073
CVE-2018-1000074
CVE-2018-1000075
CVE-2018-1000076
CVE-2018-1000077
CVE-2018-1000078
CVE-2018-1000079
CVE-2018-16395
CVE-2018-16396
CVE-2018-6914
CVE-2018-8777
CVE-2018-8778
CVE-2018-8779
CVE-2018-8780
CVE-2019-15845
CVE-2019-16201
CVE-2019-16254
CVE-2019-16255
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
CVE-2020-10663
libxerces-c-3_1=3.1.1-13.3.6 CVE-2017-12627
libadns1=1.4-103.3.1 CVE-2017-9103
CVE-2017-9104
CVE-2017-9105
CVE-2017-9106
CVE-2017-9107
CVE-2017-9108
CVE-2017-9109
libX11-6=1.6.2-12.12.1
libX11-data=1.6.2-12.12.1
CVE-2018-14598
CVE-2018-14599
CVE-2018-14600
CVE-2020-14344
libopenssl1_0_0=1.0.2j-60.60.1
libowb1_0_0=1.3.5.0-1
openssl=1.0.2j-60.60.1
CVE-2019-1551
libpython3_4m1_0=3.4.10-25.52.1
python3=3.4.10-25.52.1
python3-base=3.4.10-25.52.1
CVE-2019-16935
CVE-2019-18348
CVE-2019-20907
CVE-2019-9947
CVE-2020-14422
libpython2_7-1_0=2.7.17-28.45.1
python-base=2.7.17-28.45.1
python-xml=2.7.17-28.45.1
CVE-2019-18348
CVE-2019-9947
vim=7.4.326-17.6.1
vim-data=7.4.326-17.6.1
CVE-2019-20807
glibc=2.22-113.4
glibc-i18ndata=2.22-113.4
glibc-locale=2.22-113.4
CVE-2020-10029
perl=5.18.2-12.23.1
perl-base=5.18.2-12.23.1
CVE-2020-10543
CVE-2020-10878
CVE-2020-12723
libfreetype6=2.6.3-7.18.1 CVE-2020-15999
libproxy1=0.4.13-18.3.1 CVE-2020-25219
CVE-2020-26154
java-1_8_0-openjdk-headless=1.8.0.252-27.45.6
java-1_8_0-openjdk=1.8.0.252-27.45.6
CVE-2020-2754
CVE-2020-2755
CVE-2020-2756
CVE-2020-2757
CVE-2020-2773
CVE-2020-2781
CVE-2020-2800
CVE-2020-2803
CVE-2020-2805
CVE-2020-2830
curl=7.37.0-37.47.1
libcurl4=7.37.0-37.47.1
CVE-2020-8177
 

Dell EMC creates and distributes the Data Protection Central OS Update.  These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

Dell EMC recommends all customers upgrade at the earliest opportunity.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation



Affected Products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4
Dell EMC IDPA System Manager version 18.1, 18.2, 19.2

Remediation: 
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.

Dell EMC creates and distributes the Data Protection Central OS Update.  These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

Dell EMC recommends all customers upgrade at the earliest opportunity.


Affected Products:
Dell EMC Data Protection Central versions 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4
Dell EMC IDPA System Manager version 18.1, 18.2, 19.2

Remediation: 
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.

Dell EMC creates and distributes the Data Protection Central OS Update.  These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.

Dell EMC recommends all customers upgrade at the earliest opportunity.

Related Information

Affected Products

Data Protection Central

Products

Data Protection Central
Article Properties
Article Number: 000181249
Article Type: Dell Security Advisory
Last Modified: 22 May 2021
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.