DSA-2025-330: Security update for Dell ObjectScale 4.1.0.0 Multiple Third-Party Component Vulnerabilities
Riepilogo: Dell ObjectScale 4.1.0.0 remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Questo articolo si applica a
Questo articolo non si applica a
Questo articolo non è legato a un prodotto specifico.
Non tutte le versioni del prodotto sono identificate in questo articolo.
Impatto
High
Dettagli
| Third-party Component | CVE | More Information |
| java | CVE-2025-30698, CVE-2025-21587, CVE-2024-21217, CVE-2024-21235 | https://nvd.nist.gov/vuln/search |
| kernel-default | CVE-2021-47202, CVE-2024-41087, CVE-2024-50154, CVE-2024-53206, CVE-2024-56570, CVE-2022-49720, CVE-2022-49385, CVE-2022-49384, CVE-2022-49377, CVE-2022-49287, CVE-2022-49270, CVE-2022-49114, CVE-2022-49082, CVE-2022-49078, CVE-2022-49063, CVE-2022-49058 | https://nvd.nist.gov/vuln/search |
| libpython3 | CVE-2024-8088, CVE-2024-7592, CVE-2024-6232, CVE-2023-30608, CVE-2024-6923, CVE-2024-9287 | https://nvd.nist.gov/vuln/search |
| Netty Project | CVE-2025-24970, CVE-2025-25193 | https://nvd.nist.gov/vuln/search |
| jetty | CVE-2024-22201 | https://nvd.nist.gov/vuln/search |
| Python programming language | CVE-2025-1795, CVE-2025-0938 | https://nvd.nist.gov/vuln/search |
| python311-cryptography | CVE-2025-3416 | https://nvd.nist.gov/vuln/search |
| python3-curses | CVE-2024-5642, CVE-2023-6597, CVE-2024-0397, CVE-2024-0450, CVE-2024-4032 | https://nvd.nist.gov/vuln/search |
| python3-Jinja2 | CVE-2025-27516 | https://nvd.nist.gov/vuln/search |
| python-setuptools | CVE-2024-6345 | https://nvd.nist.gov/vuln/search |
| spring-security-crypto | CVE-2025-22228 | https://nvd.nist.gov/vuln/search |
Prodotti interessati e correzione
| Product | Affected Versions | Remediated Versions | Link |
| ObjectScale | Versions prior to 4.1.0.0 | Version 4.1.0.0 or later | Open a Service Request for an Operating Environment Upgrade and Quote DSA-2025-330 |
| Product | Affected Versions | Remediated Versions | Link |
| ObjectScale | Versions prior to 4.1.0.0 | Version 4.1.0.0 or later | Open a Service Request for an Operating Environment Upgrade and Quote DSA-2025-330 |
Note:
- Dell recommends all customers have their ObjectScale systems upgraded at the earliest opportunity by opening an “Operating Environment Upgrade” Service Request.
- Please visit the Security Update Release Schedule for Supported Versions of ObjectScale (formerly ECS) for more information.
Soluzioni alternative e mitigazioni
None
Cronologia delle revisioni
| Revision | Date | Description |
| 1.0 | 2025-09-01 | Initial Release |
Informazioni correlate
Dichiarazione di non responsabilità
Prodotti interessati
ECS, ObjectScale, ECS Appliance, ECS Appliance Hardware Series, ECS Appliance Software with Encryption, ECS Appliance Software without Encryption, ObjectScale Appliance Software with Encryption, ObjectScale Appliance Software without Encryption
, ObjectScale Appliance Series, ObjectScale Software Series
...
Proprietà dell'articolo
Numero articolo: 000363699
Tipo di articolo: Dell Security Advisory
Ultima modifica: 01 set 2025
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.