DSA-2021-029: Dell EMC Data Protection Central OS Update for Multiple Third-Party Component Vulnerabilities
Riepilogo: Dell EMC Data Protection Central OS Update contains remediation for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Questo articolo si applica a
Questo articolo non si applica a
Questo articolo non è legato a un prodotto specifico.
Non tutte le versioni del prodotto sono identificate in questo articolo.
Impatto
Critical
Dettagli
SP2-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.4.121-92.146.1 | CVE-2020-25705 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2020-25656 | ||
| CVE-2017-18204 | ||
| CVE-2020-14351 | ||
| CVE-2020-8694 | ||
| CVE-2020-12352 | ||
| CVE-2020-25645 | ||
| CVE-2020-14381 | ||
| CVE-2020-25212 | ||
| CVE-2020-14390 | ||
| CVE-2020-25643 | ||
| CVE-2020-26088 | ||
| CVE-2020-0432 | ||
| CVE-2020-0431 | ||
| CVE-2020-0427 | ||
| CVE-2020-0404 | ||
| CVE-2020-25284 | ||
| krb5=1.12.5-40.40.2 | CVE-2020-28196 | |
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libX11-6=1.6.2-12.15.1 libX11-data=1.6.2-12.15.1 |
CVE-2020-14363 | |
| libgcc_s1=10.2.1+git583-1.3.5 libstdc++6=10.2.1+git583-1.3.5 |
CVE-2020-13844 | |
| libldap-2_4-2=2.4.41-18.77.1 openldap2=2.4.41-18.77.1 openldap2-client=2.4.41-18.77.1 |
CVE-2020-25692 | |
| libpython2_7-1_0=2.7.17-28.59.1 python-base=2.7.17-28.59.1 python-xml=2.7.17-28.59.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| CVE-2019-20907 | ||
| libpython3_4m1_0=3.4.10-25.58.1 python3=3.4.10-25.58.1 python3-base=3.4.10-25.58.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2020-24977 | |
| CVE-2019-19956 | ||
| CVE-2019-20388 | ||
| CVE-2020-7595 | ||
| CVE-2016-9318 | ||
| CVE-2018-9251 | ||
| CVE-2018-14567 | ||
| CVE-2018-14404 | ||
| CVE-2017-18258 | ||
| libzypp=16.21.4-27.73.1 | CVE-2019-18900 | |
| openssh-fips=7.2p2-74.57.1 openssh-helpers=7.2p2-74.57.1 openssh=7.2p2-74.57.1 |
CVE-2020-14145 | |
| sudo=1.8.10p3-10.29.1 | CVE-2021-3156 | |
| CVE-2021-23239 |
SP5-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.12.14-122.57.1 | CVE-2020-28374 | |
| CVE-2020-36158 | ||
| CVE-2020-27825 | ||
| CVE-2020-0466 | ||
| CVE-2020-27068 | ||
| CVE-2020-0465 | ||
| CVE-2020-0444 | ||
| CVE-2020-29660 | ||
| CVE-2020-29661 | ||
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libldap-2_4-2=2.4.41-18.80.1 openldap2=2.4.41-18.80.1 |
CVE-2020-25709 | |
| libpython3_6m1_0=3.6.12-4.28.1 python36-base=3.6.12-4.28.1 python36=3.6.12-4.28.1 |
CVE-2020-27619 | |
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libstdc++6=10.2.1+git583-1.3.5 | CVE-2020-13844 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2017-7376 | |
| CVE-2017-7375 | ||
| CVE-2017-9047 | ||
| CVE-2017-9049 | ||
| CVE-2017-0663 | ||
| CVE-2017-5969 | ||
| CVE-2017-9050 | ||
| CVE-2017-9048 | ||
| CVE-2016-9597 | ||
| CVE-2016-4658 | ||
| CVE-2016-3627 | ||
| CVE-2016-1837 | ||
| CVE-2016-1840 | ||
| CVE-2016-1762 | ||
| CVE-2015-1819 | ||
| CVE-2015-5312 | ||
| CVE-2015-7497 | ||
| CVE-2015-7498 | ||
| CVE-2015-7499 | ||
| CVE-2015-7500 | ||
| CVE-2015-7941 | ||
| CVE-2015-7942 | ||
| CVE-2015-8241 | ||
| CVE-2015-8242 | ||
| CVE-2015-8317 | ||
| CVE-2015-8710 | ||
| CVE-2014-0191 | ||
| CVE-2012-5134 | ||
| CVE-2013-0338 | ||
| CVE-2013-1969 | ||
| CVE-2010-4494 | ||
| CVE-2011-1944 | ||
| CVE-2008-4225 | ||
| CVE-2008-4226 | ||
| CVE-2008-4409 | ||
| openssh-fips=7.2p2-78.10.1 openssh-helpers=7.2p2-78.10.1 openssh=7.2p2-78.10.1 |
CVE-2020-14145 | |
| sudo=1.8.27-4.6.1 | CVE-2021-3156 | |
| CVE-2021-23239 | ||
| CVE-2021-23240 |
SP2-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.4.121-92.146.1 | CVE-2020-25705 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| CVE-2020-25656 | ||
| CVE-2017-18204 | ||
| CVE-2020-14351 | ||
| CVE-2020-8694 | ||
| CVE-2020-12352 | ||
| CVE-2020-25645 | ||
| CVE-2020-14381 | ||
| CVE-2020-25212 | ||
| CVE-2020-14390 | ||
| CVE-2020-25643 | ||
| CVE-2020-26088 | ||
| CVE-2020-0432 | ||
| CVE-2020-0431 | ||
| CVE-2020-0427 | ||
| CVE-2020-0404 | ||
| CVE-2020-25284 | ||
| krb5=1.12.5-40.40.2 | CVE-2020-28196 | |
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libX11-6=1.6.2-12.15.1 libX11-data=1.6.2-12.15.1 |
CVE-2020-14363 | |
| libgcc_s1=10.2.1+git583-1.3.5 libstdc++6=10.2.1+git583-1.3.5 |
CVE-2020-13844 | |
| libldap-2_4-2=2.4.41-18.77.1 openldap2=2.4.41-18.77.1 openldap2-client=2.4.41-18.77.1 |
CVE-2020-25692 | |
| libpython2_7-1_0=2.7.17-28.59.1 python-base=2.7.17-28.59.1 python-xml=2.7.17-28.59.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| CVE-2019-20907 | ||
| libpython3_4m1_0=3.4.10-25.58.1 python3=3.4.10-25.58.1 python3-base=3.4.10-25.58.1 |
CVE-2019-20916 | |
| CVE-2020-26116 | ||
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2020-24977 | |
| CVE-2019-19956 | ||
| CVE-2019-20388 | ||
| CVE-2020-7595 | ||
| CVE-2016-9318 | ||
| CVE-2018-9251 | ||
| CVE-2018-14567 | ||
| CVE-2018-14404 | ||
| CVE-2017-18258 | ||
| libzypp=16.21.4-27.73.1 | CVE-2019-18900 | |
| openssh-fips=7.2p2-74.57.1 openssh-helpers=7.2p2-74.57.1 openssh=7.2p2-74.57.1 |
CVE-2020-14145 | |
| sudo=1.8.10p3-10.29.1 | CVE-2021-3156 | |
| CVE-2021-23239 |
SP5-based systems
| Third-party Component | CVE(s) | More Information |
| kernel-default=4.12.14-122.57.1 | CVE-2020-28374 | |
| CVE-2020-36158 | ||
| CVE-2020-27825 | ||
| CVE-2020-0466 | ||
| CVE-2020-27068 | ||
| CVE-2020-0465 | ||
| CVE-2020-0444 | ||
| CVE-2020-29660 | ||
| CVE-2020-29661 | ||
| libFLAC8=1.3.0-12.3.1 | CVE-2020-0499 | |
| libldap-2_4-2=2.4.41-18.80.1 openldap2=2.4.41-18.80.1 |
CVE-2020-25709 | |
| libpython3_6m1_0=3.6.12-4.28.1 python36-base=3.6.12-4.28.1 python36=3.6.12-4.28.1 |
CVE-2020-27619 | |
| libsasl2-3=2.1.26-8.13.1 | CVE-2019-19906 | |
| libstdc++6=10.2.1+git583-1.3.5 | CVE-2020-13844 | |
| libxml2-2=2.9.4-46.37.1 libxml2-tools=2.9.4-46.37.1 |
CVE-2017-7376 | |
| CVE-2017-7375 | ||
| CVE-2017-9047 | ||
| CVE-2017-9049 | ||
| CVE-2017-0663 | ||
| CVE-2017-5969 | ||
| CVE-2017-9050 | ||
| CVE-2017-9048 | ||
| CVE-2016-9597 | ||
| CVE-2016-4658 | ||
| CVE-2016-3627 | ||
| CVE-2016-1837 | ||
| CVE-2016-1840 | ||
| CVE-2016-1762 | ||
| CVE-2015-1819 | ||
| CVE-2015-5312 | ||
| CVE-2015-7497 | ||
| CVE-2015-7498 | ||
| CVE-2015-7499 | ||
| CVE-2015-7500 | ||
| CVE-2015-7941 | ||
| CVE-2015-7942 | ||
| CVE-2015-8241 | ||
| CVE-2015-8242 | ||
| CVE-2015-8317 | ||
| CVE-2015-8710 | ||
| CVE-2014-0191 | ||
| CVE-2012-5134 | ||
| CVE-2013-0338 | ||
| CVE-2013-1969 | ||
| CVE-2010-4494 | ||
| CVE-2011-1944 | ||
| CVE-2008-4225 | ||
| CVE-2008-4226 | ||
| CVE-2008-4409 | ||
| openssh-fips=7.2p2-78.10.1 openssh-helpers=7.2p2-78.10.1 openssh=7.2p2-78.10.1 |
CVE-2020-14145 | |
| sudo=1.8.27-4.6.1 | CVE-2021-3156 | |
| CVE-2021-23239 | ||
| CVE-2021-23240 |
Prodotti interessati e correzione
| Product | Affected Version(s) | Updated Version(s) | Link to Update | |
| Dell EMC Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | Software Release Notes |
|
| Dell EMC IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | Software Release Notes |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
| Product | Affected Version(s) | Updated Version(s) | Link to Update | |
| Dell EMC Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | Software Release Notes |
|
| Dell EMC IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | Software Release Notes |
Dell EMC creates and distributes the Data Protection Central OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell EMC Data Protection Central system, see https://support.emc.com/kb/522157 for installation instructions.
Soluzioni alternative e mitigazioni
None
Cronologia delle revisioni
| Revision | Date | Description |
| 1.0 | 2021-02-04 | Initial release |
Informazioni correlate
Dichiarazione di non responsabilità
Prodotti interessati
Data Protection CentralProdotti
Data Protection Central, Product Security InformationProprietà dell'articolo
Numero articolo: 000182746
Tipo di articolo: Dell Security Advisory
Ultima modifica: 22 mag 2021
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.