DSA-2025-330: Security update for Dell ObjectScale 4.1.0.0 Multiple Third-Party Component Vulnerabilities
Сводка: Dell ObjectScale 4.1.0.0 remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.
Данная статья применяется к
Данная статья не применяется к
Эта статья не привязана к какому-либо конкретному продукту.
В этой статье указаны не все версии продуктов.
Влияние
High
Подробные сведения
| Third-party Component | CVE | More Information |
| java | CVE-2025-30698, CVE-2025-21587, CVE-2024-21217, CVE-2024-21235 | https://nvd.nist.gov/vuln/search |
| kernel-default | CVE-2021-47202, CVE-2024-41087, CVE-2024-50154, CVE-2024-53206, CVE-2024-56570, CVE-2022-49720, CVE-2022-49385, CVE-2022-49384, CVE-2022-49377, CVE-2022-49287, CVE-2022-49270, CVE-2022-49114, CVE-2022-49082, CVE-2022-49078, CVE-2022-49063, CVE-2022-49058 | https://nvd.nist.gov/vuln/search |
| libpython3 | CVE-2024-8088, CVE-2024-7592, CVE-2024-6232, CVE-2023-30608, CVE-2024-6923, CVE-2024-9287 | https://nvd.nist.gov/vuln/search |
| Netty Project | CVE-2025-24970, CVE-2025-25193 | https://nvd.nist.gov/vuln/search |
| jetty | CVE-2024-22201 | https://nvd.nist.gov/vuln/search |
| Python programming language | CVE-2025-1795, CVE-2025-0938 | https://nvd.nist.gov/vuln/search |
| python311-cryptography | CVE-2025-3416 | https://nvd.nist.gov/vuln/search |
| python3-curses | CVE-2024-5642, CVE-2023-6597, CVE-2024-0397, CVE-2024-0450, CVE-2024-4032 | https://nvd.nist.gov/vuln/search |
| python3-Jinja2 | CVE-2025-27516 | https://nvd.nist.gov/vuln/search |
| python-setuptools | CVE-2024-6345 | https://nvd.nist.gov/vuln/search |
| spring-security-crypto | CVE-2025-22228 | https://nvd.nist.gov/vuln/search |
Затронутые продукты и исправление
| Product | Affected Versions | Remediated Versions | Link |
| ObjectScale | Versions prior to 4.1.0.0 | Version 4.1.0.0 or later | Open a Service Request for an Operating Environment Upgrade and Quote DSA-2025-330 |
| Product | Affected Versions | Remediated Versions | Link |
| ObjectScale | Versions prior to 4.1.0.0 | Version 4.1.0.0 or later | Open a Service Request for an Operating Environment Upgrade and Quote DSA-2025-330 |
Note:
- Dell recommends all customers have their ObjectScale systems upgraded at the earliest opportunity by opening an “Operating Environment Upgrade” Service Request.
- Please visit the Security Update Release Schedule for Supported Versions of ObjectScale (formerly ECS) for more information.
Временные решения и снижение риска
None
История изменений
| Revision | Date | Description |
| 1.0 | 2025-09-01 | Initial Release |
Связанная информация
Правовая оговорка
Затронутые продукты
ECS, ObjectScale, ECS Appliance, ECS Appliance Hardware Series, ECS Appliance Software with Encryption, ECS Appliance Software without Encryption, ObjectScale Appliance Software with Encryption, ObjectScale Appliance Software without Encryption
, ObjectScale Appliance Series, ObjectScale Software Series
...
Свойства статьи
Номер статьи: 000363699
Тип статьи: Dell Security Advisory
Последнее изменение: 01 Sep 2025
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.