DSA-2021-029: Dell EMC Data Protection Central OS Update for Multiple Third-Party Component Vulnerabilities
Summary: Dell EMC Data Protection Central OS Update contains remediation for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
Critical
Details
SP2-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.4.121-92.146.1 | CVE-2020-25705 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2020-25656 | ||
| CVE-2017-18204 | ||
| CVE-2020-14351 | ||
| CVE-2020-8694 | ||
| CVE-2020-12352 | ||
| CVE-2020-25645 | ||
| CVE-2020-14381 | ||
| CVE-2020-25212 | ||
| CVE-2020-14390 | ||
| CVE-2020-25643 | ||
| CVE-2020-26088 | ||
| CVE-2020-0432 | ||
| CVE-2020-0431 | ||
| CVE-2020-0427 | ||
| CVE-2020-0404 | ||
| CVE-2020-25284 | ||
| krb5=1.12.5-40.40.2 | CVE-2020-28196 | |
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libX11-6=1.6.2-12.15.1 libX11-data=1.6.2-12.15.1 |
CVE-2020-14363 | |
| libgcc_s1=10.2.1+git583-1.3.5 libstdc++6=10.2.1+git583-1.3.5 |
CVE-2020-13844 | |
| libldap-2_4-2=2.4.41-18.77.1 openldap2=2.4.41-18.77.1 openldap2-client=2.4.41-18.77.1 |
CVE-2020-25692 | |
| libpython2_7-1_0=2.7.17-28.59.1 python-base=2.7.17-28.59.1 python-xml=2.7.17-28.59.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| CVE-2019-20907 | ||
| libpython3_4m1_0=3.4.10-25.58.1 python3=3.4.10-25.58.1 python3-base=3.4.10-25.58.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2020-24977 | |
| CVE-2019-19956 | ||
| CVE-2019-20388 | ||
| CVE-2020-7595 | ||
| CVE-2016-9318 | ||
| CVE-2018-9251 | ||
| CVE-2018-14567 | ||
| CVE-2018-14404 | ||
| CVE-2017-18258 | ||
| libzypp=16.21.4-27.73.1 | CVE-2019-18900 | |
| openssh-fips=7.2p2-74.57.1 openssh-helpers=7.2p2-74.57.1 openssh=7.2p2-74.57.1 |
CVE-2020-14145 | |
| sudo=1.8.10p3-10.29.1 | CVE-2021-3156 | |
| CVE-2021-23239 |
SP5-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.12.14-122.57.1 | CVE-2020-28374 | |
| CVE-2020-36158 | ||
| CVE-2020-27825 | ||
| CVE-2020-0466 | ||
| CVE-2020-27068 | ||
| CVE-2020-0465 | ||
| CVE-2020-0444 | ||
| CVE-2020-29660 | ||
| CVE-2020-29661 | ||
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libldap-2_4-2=2.4.41-18.80.1 openldap2=2.4.41-18.80.1 |
CVE-2020-25709 | |
| libpython3_6m1_0=3.6.12-4.28.1 python36-base=3.6.12-4.28.1 python36=3.6.12-4.28.1 |
CVE-2020-27619 | |
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libstdc++6=10.2.1+git583-1.3.5 | CVE-2020-13844 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2017-7376 | |
| CVE-2017-7375 | ||
| CVE-2017-9047 | ||
| CVE-2017-9049 | ||
| CVE-2017-0663 | ||
| CVE-2017-5969 | ||
| CVE-2017-9050 | ||
| CVE-2017-9048 | ||
| CVE-2016-9597 | ||
| CVE-2016-4658 | ||
| CVE-2016-3627 | ||
| CVE-2016-1837 | ||
| CVE-2016-1840 | ||
| CVE-2016-1762 | ||
| CVE-2015-1819 | ||
| CVE-2015-5312 | ||
| CVE-2015-7497 | ||
| CVE-2015-7498 | ||
| CVE-2015-7499 | ||
| CVE-2015-7500 | ||
| CVE-2015-7941 | ||
| CVE-2015-7942 | ||
| CVE-2015-8241 | ||
| CVE-2015-8242 | ||
| CVE-2015-8317 | ||
| CVE-2015-8710 | ||
| CVE-2014-0191 | ||
| CVE-2012-5134 | ||
| CVE-2013-0338 | ||
| CVE-2013-1969 | ||
| CVE-2010-4494 | ||
| CVE-2011-1944 | ||
| CVE-2008-4225 | ||
| CVE-2008-4226 | ||
| CVE-2008-4409 | ||
| openssh-fips=7.2p2-78.10.1 openssh-helpers=7.2p2-78.10.1 openssh=7.2p2-78.10.1 |
CVE-2020-14145 | |
| sudo=1.8.27-4.6.1 | CVE-2021-3156 | |
| CVE-2021-23239 | ||
| CVE-2021-23240 |
SP2-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.4.121-92.146.1 | CVE-2020-25705 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2020-25656 | ||
| CVE-2017-18204 | ||
| CVE-2020-14351 | ||
| CVE-2020-8694 | ||
| CVE-2020-12352 | ||
| CVE-2020-25645 | ||
| CVE-2020-14381 | ||
| CVE-2020-25212 | ||
| CVE-2020-14390 | ||
| CVE-2020-25643 | ||
| CVE-2020-26088 | ||
| CVE-2020-0432 | ||
| CVE-2020-0431 | ||
| CVE-2020-0427 | ||
| CVE-2020-0404 | ||
| CVE-2020-25284 | ||
| krb5=1.12.5-40.40.2 | CVE-2020-28196 | |
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libX11-6=1.6.2-12.15.1 libX11-data=1.6.2-12.15.1 |
CVE-2020-14363 | |
| libgcc_s1=10.2.1+git583-1.3.5 libstdc++6=10.2.1+git583-1.3.5 |
CVE-2020-13844 | |
| libldap-2_4-2=2.4.41-18.77.1 openldap2=2.4.41-18.77.1 openldap2-client=2.4.41-18.77.1 |
CVE-2020-25692 | |
| libpython2_7-1_0=2.7.17-28.59.1 python-base=2.7.17-28.59.1 python-xml=2.7.17-28.59.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| CVE-2019-20907 | ||
| libpython3_4m1_0=3.4.10-25.58.1 python3=3.4.10-25.58.1 python3-base=3.4.10-25.58.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2020-24977 | |
| CVE-2019-19956 | ||
| CVE-2019-20388 | ||
| CVE-2020-7595 | ||
| CVE-2016-9318 | ||
| CVE-2018-9251 | ||
| CVE-2018-14567 | ||
| CVE-2018-14404 | ||
| CVE-2017-18258 | ||
| libzypp=16.21.4-27.73.1 | CVE-2019-18900 | |
| openssh-fips=7.2p2-74.57.1 openssh-helpers=7.2p2-74.57.1 openssh=7.2p2-74.57.1 |
CVE-2020-14145 | |
| sudo=1.8.10p3-10.29.1 | CVE-2021-3156 | |
| CVE-2021-23239 |
SP5-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.12.14-122.57.1 | CVE-2020-28374 | |
| CVE-2020-36158 | ||
| CVE-2020-27825 | ||
| CVE-2020-0466 | ||
| CVE-2020-27068 | ||
| CVE-2020-0465 | ||
| CVE-2020-0444 | ||
| CVE-2020-29660 | ||
| CVE-2020-29661 | ||
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libldap-2_4-2=2.4.41-18.80.1 openldap2=2.4.41-18.80.1 |
CVE-2020-25709 | |
| libpython3_6m1_0=3.6.12-4.28.1 python36-base=3.6.12-4.28.1 python36=3.6.12-4.28.1 |
CVE-2020-27619 | |
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libstdc++6=10.2.1+git583-1.3.5 | CVE-2020-13844 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2017-7376 | |
| CVE-2017-7375 | ||
| CVE-2017-9047 | ||
| CVE-2017-9049 | ||
| CVE-2017-0663 | ||
| CVE-2017-5969 | ||
| CVE-2017-9050 | ||
| CVE-2017-9048 | ||
| CVE-2016-9597 | ||
| CVE-2016-4658 | ||
| CVE-2016-3627 | ||
| CVE-2016-1837 | ||
| CVE-2016-1840 | ||
| CVE-2016-1762 | ||
| CVE-2015-1819 | ||
| CVE-2015-5312 | ||
| CVE-2015-7497 | ||
| CVE-2015-7498 | ||
| CVE-2015-7499 | ||
| CVE-2015-7500 | ||
| CVE-2015-7941 | ||
| CVE-2015-7942 | ||
| CVE-2015-8241 | ||
| CVE-2015-8242 | ||
| CVE-2015-8317 | ||
| CVE-2015-8710 | ||
| CVE-2014-0191 | ||
| CVE-2012-5134 | ||
| CVE-2013-0338 | ||
| CVE-2013-1969 | ||
| CVE-2010-4494 | ||
| CVE-2011-1944 | ||
| CVE-2008-4225 | ||
| CVE-2008-4226 | ||
| CVE-2008-4409 | ||
| openssh-fips=7.2p2-78.10.1 openssh-helpers=7.2p2-78.10.1 openssh=7.2p2-78.10.1 |
CVE-2020-14145 | |
| sudo=1.8.27-4.6.1 | CVE-2021-3156 | |
| CVE-2021-23239 | ||
| CVE-2021-23240 |
Affected Products & Remediation
| Product | Affected Version(s) | Updated Version(s) | Link to Update | |
| Dell EMC Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | Software Release Notes |
|
| Dell EMC IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | Software Release Notes |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
| Product | Affected Version(s) | Updated Version(s) | Link to Update | |
| Dell EMC Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | Software Release Notes |
|
| Dell EMC IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | Software Release Notes |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
Workarounds & Mitigations
None
Revision History
| Revision | Date | Description |
| 1.0 | 2021-02-04 | Initial release |
Related Information
Legal Disclaimer
Affected Products
Data Protection CentralProducts
Data Protection Central, Product Security InformationArticle Properties
Article Number: 000182746
Article Type: Dell Security Advisory
Last Modified: 22 May 2021
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.