DSA-2025-122: Security Update for Dell Connectrix SANnav Multiple Component Vulnerabilities
Summary: Dell Connectrix SANnav remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
High
Details
| Third-party Component | CVEs | More Information |
| bind-utils | CVE-2022-38178 | BSA-2025-2264 |
| encryption | CVE-2024-10405, CVE-2024-4282 | BSA-2025-2891 |
| Docker | CVE-2024-2240 | BSA-2025-2896 |
| Supportsave | CVE-2025-1053, CVE-2024-10404 | BSA-2025-2894 |
| PostgreSQL | CVE-2024-4317, CVE-2024-0985, CVE-2023-5870 | BSA-2025-2732 |
| Curl | CVE-2024-2398, CVE-2024-2466, CVE-2024-2004, CVE-2024-0853 | BSA-2025-2578 |
| less | CVE-02024-32487 | BSA-2025-2668 |
| Rocky Linux | CVE-2024-44935, CVE-2024-27017, CVE-2024-26851, CVE-2024-41093, CVE-2024-43889, CVE-2024-38541, CVE-2024-42301, CVE-2024-40924, CVE-2024-43854, CVE-2024-42070, CVE-2024-42284, CVE-2024-26976, CVE-2024-47668, CVE-2024-38540, CVE-2024-41042, CVE-2024-41092, CVE-2024-35898, CVE-2024-43880, CVE-2024-40984, CVE-2024-38586, CVE-2024-40983, CVE-2024-44989, CVE-2024-44990, CVE-2024-24857, CVE-2024-27062, CVE-2023-52492, CVE-2024-40961, CVE-2024-35839, CVE-2022-48773, CVE-2024-35939, CVE-2024-26924, CVE-2024-38608, CVE-2024-42244, CVE-2024-46826, CVE-2024-43892, CVE-2024-42079, CVE-2024-41066, CVE-2024-45018, CVE-2024-41009, CVE-2024-39503, CVE-2024-42292, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2019-12900, CVE-2024-3596, CVE-2024-4032, CVE-2024-6232, CVE-2024-6923 | BSA-2025-2889 |
| Kernel | CVE-2024-6345, CVE-2024-27010, CVE-2023-52469, CVE-2021-47624, CVE-2024-35896, CVE-2024-38615, CVE-2024-26640, CVE-2024-35946, CVE-2024-36950, CVE-2023-52653, CVE-2024-35899, CVE-2023-52764, CVE-2023-52486, CVE-2023-52662, CVE-2021-47304, CVE-2024-36010, CVE-2022-48747, CVE-2023-52834, CVE-2024-38575, CVE-2024-35937, CVE-2024-38598, CVE-2024-39487, CVE-2024-26925, CVE-2024-27020, CVE-2024-26852, CVE-2021-47257, CVE-2024-26810, CVE-2024-36979, CVE-2021-47468, CVE-2023-5281, CVE-2024-27395, CVE-2023-52707, CVE-2024-27434, CVE-2024-36945, CVE-2024-36978, CVE-2024-36005, CVE-2024-35900, CVE-2024-35823, CVE-2024-26586, CVE-2024-35790, CVE-2022-48757, CVE-2024-26853, CVE-2023-52847, CVE-2024-36270, CVE-2024-36927, CVE-2024-26686, CVE-2024-38573, CVE-2023-52648, CVE-2024-35897, CVE-2023-52623, CVE-2024-25739, CVE-2023-52619, CVE-2022-48743, CVE-2024-35847, CVE-2024-39502, CVE-2024-35947, CVE-2024-35912, CVE-2024-36017, CVE-2021-47408, CVE-2021-47461, CVE-2023-52730, CVE-2024-35814, CVE-2024-39472, CVE-2021-47284, CVE-2024-35952, CVE-2024-26960, CVE-2024-26698, CVE-2024-36000, CVE-2024-26669, CVE-2021-46939, CVE-2024-2701, CVE-2021-47491, CVE-2023-52845, CVE-2024-26704, CVE-2024-35807, CVE-2023-28746, CVE-2024-39476, CVE-2024-36941, CVE-2024-35938, CVE-2024-27025, CVE-2024-39276, CVE-2023-52777, CVE-2023-52796, CVE-2024-38596, CVE-2023-52463, CVE-2021-47579, CVE-2024-33621, CVE-2023-52832, CVE-2024-26878, CVE-2024-26840, CVE-2024-26921, CVE-2024-26772, CVE-2021-47018, CVE-2024-35925, CVE-2024-35924, CVE-2024-36933, CVE-2024-36286, CVE-2023-52864, CVE-2024-26660, CVE-2021-47373, CVE-2024-35893, CVE-2024-36940, CVE-2024-27019, CVE-2024-36929, CVE-2024-38627, CVE-2024-36921, CVE-2023-52658, CVE-2023-52784, CVE-2024-36905, CVE-2024-36917, CVE-2023-52530, CVE-2024-26958, CVE-2024-36896, CVE-2024-38555, CVE-2023-52679, CVE-2024-36020, CVE-2024-36886, CVE-2024-36954, CVE-2024-21823, CVE-2024-31076, CVE-2023-52791, CVE-2024-40927, CVE-2023-52762, CVE-2024-36960, CVE-2024-36025, CVE-2023-52451, CVE-2024-26802, CVE-2024-36016, CVE-2023-52471, CVE-2024-36489, CVE-2024-35930, CVE-2024-26961, CVE-2024-36971, CVE-2024-26733, CVE-2024-2201, CVE-2024-40974, CVE-2024-27065, CVE-2024-27388, CVE-2024-35810, CVE-2024-26940, CVE-2024-38538, CVE-2024-35910, CVE-2024-36006, CVE-2022-48632, CVE-2024-36889, CVE-2024-26773, CVE-2024-26614, CVE-2023-52803, CVE-2024-35801, CVE-2023-52622, CVE-2024-35824, CVE-2023-52775, CVE-2024-26740, CVE-2024-26870, CVE-2024-36904, CVE-2024-26843, CVE-2021-47548, CVE-2024-26837, CVE-2024-35958, CVE-2024-36886, CVE-2024-36270, CVE-2024-36957, CVE-2024-38593, CVE-2021-47596, CVE-2022-48627, CVE-2024-27435, CVE-2024-38663, CVE-2024-27397, CVE-2024-38586, CVE-2023-52638, CVE-2024-38543, CVE-2024-26783, CVE-2024-26858, CVE-2024-5564, CVE-2024-28182, CVE-2024-32487, CVE-2024-26735, CVE-2024-26993, CVE-2023-52667, CVE-2024-27393, CVE-2024-35870, CVE-2024-26801, CVE-2023-52626, CVE-2024-26974, CVE-2024-35960, CVE-2021-47400, CVE-2024-33601, CVE-2024-33602, CVE-2024-33600, CVE-2024-2961, CVE-2024-33599, CVE-2023-6597, CVE-2024-0450, CVE-2024-25743, CVE-2023-6240, CVE-2024-25742 | BSA-2025-2895 |
Affected Products & Remediation
| Product | Affected Versions | Remediated Versions | Link |
| Connectrix SANnav | Versions prior to 2.3.1a | Version 2.3.1b or later | https://www.dell.com/support/product-details/product/connectrix-sannav/drivers |
| Product | Affected Versions | Remediated Versions | Link |
| Connectrix SANnav | Versions prior to 2.3.1a | Version 2.3.1b or later | https://www.dell.com/support/product-details/product/connectrix-sannav/drivers |
Revision History
| Revision | Date | Description |
| 1.0 | 2025-05-06 | Initial Release |
Related Information
Legal Disclaimer
Affected Products
Connectrix, Connectrix B-Series Software, Connectrix SANnavArticle Properties
Article Number: 000317792
Article Type: Dell Security Advisory
Last Modified: 06 May 2025
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.