DSA-2025-122:  Security Update for Dell Connectrix SANnav Multiple Component Vulnerabilities 

Zhrnutie: Dell Connectrix SANnav remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

Tento článok sa vzťahuje na Tento článok sa nevzťahuje na Tento článok nie je viazaný na žiadny konkrétny produkt. V tomto článku nie sú uvedené všetky verzie produktov.

Dosah

High

Podrobnosti

Third-party Component CVEs More Information
bind-utils CVE-2022-38178 BSA-2025-2264This hyperlink is taking you to a website outside of Dell Technologies.
encryption CVE-2024-10405, CVE-2024-4282 BSA-2025-2891This hyperlink is taking you to a website outside of Dell Technologies., BSA-2025-2892This hyperlink is taking you to a website outside of Dell Technologies.
Docker CVE-2024-2240 BSA-2025-2896This hyperlink is taking you to a website outside of Dell Technologies.
Supportsave CVE-2025-1053, CVE-2024-10404 BSA-2025-2894This hyperlink is taking you to a website outside of Dell Technologies., BSA-2025-2890This hyperlink is taking you to a website outside of Dell Technologies.
PostgreSQL   CVE-2024-4317, CVE-2024-0985, CVE-2023-5870 BSA-2025-2732This hyperlink is taking you to a website outside of Dell Technologies., BSA-2025-2733This hyperlink is taking you to a website outside of Dell Technologies., BSA-2025-2479This hyperlink is taking you to a website outside of Dell Technologies.
Curl CVE-2024-2398, CVE-2024-2466, CVE-2024-2004, CVE-2024-0853 BSA-2025-2578This hyperlink is taking you to a website outside of Dell Technologies.
less CVE-02024-32487 BSA-2025-2668This hyperlink is taking you to a website outside of Dell Technologies.
Rocky Linux CVE-2024-44935, CVE-2024-27017, CVE-2024-26851, CVE-2024-41093, CVE-2024-43889, CVE-2024-38541, CVE-2024-42301, CVE-2024-40924, CVE-2024-43854, CVE-2024-42070, CVE-2024-42284, CVE-2024-26976, CVE-2024-47668, CVE-2024-38540, CVE-2024-41042, CVE-2024-41092, CVE-2024-35898, CVE-2024-43880, CVE-2024-40984, CVE-2024-38586, CVE-2024-40983, CVE-2024-44989, CVE-2024-44990, CVE-2024-24857, CVE-2024-27062, CVE-2023-52492, CVE-2024-40961, CVE-2024-35839, CVE-2022-48773, CVE-2024-35939, CVE-2024-26924, CVE-2024-38608, CVE-2024-42244, CVE-2024-46826, CVE-2024-43892, CVE-2024-42079, CVE-2024-41066, CVE-2024-45018, CVE-2024-41009, CVE-2024-39503, CVE-2024-42292, CVE-2024-50602, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2019-12900, CVE-2024-3596, CVE-2024-4032, CVE-2024-6232, CVE-2024-6923 BSA-2025-2889This hyperlink is taking you to a website outside of Dell Technologies.
Kernel CVE-2024-6345, CVE-2024-27010, CVE-2023-52469, CVE-2021-47624, CVE-2024-35896, CVE-2024-38615, CVE-2024-26640, CVE-2024-35946, CVE-2024-36950, CVE-2023-52653, CVE-2024-35899, CVE-2023-52764, CVE-2023-52486, CVE-2023-52662, CVE-2021-47304, CVE-2024-36010, CVE-2022-48747, CVE-2023-52834, CVE-2024-38575, CVE-2024-35937, CVE-2024-38598, CVE-2024-39487, CVE-2024-26925, CVE-2024-27020, CVE-2024-26852, CVE-2021-47257, CVE-2024-26810, CVE-2024-36979, CVE-2021-47468, CVE-2023-5281, CVE-2024-27395, CVE-2023-52707, CVE-2024-27434, CVE-2024-36945, CVE-2024-36978, CVE-2024-36005, CVE-2024-35900, CVE-2024-35823, CVE-2024-26586, CVE-2024-35790, CVE-2022-48757, CVE-2024-26853, CVE-2023-52847, CVE-2024-36270, CVE-2024-36927, CVE-2024-26686, CVE-2024-38573, CVE-2023-52648, CVE-2024-35897, CVE-2023-52623, CVE-2024-25739, CVE-2023-52619, CVE-2022-48743, CVE-2024-35847, CVE-2024-39502, CVE-2024-35947, CVE-2024-35912, CVE-2024-36017, CVE-2021-47408, CVE-2021-47461, CVE-2023-52730, CVE-2024-35814, CVE-2024-39472, CVE-2021-47284, CVE-2024-35952, CVE-2024-26960, CVE-2024-26698, CVE-2024-36000, CVE-2024-26669, CVE-2021-46939, CVE-2024-2701, CVE-2021-47491, CVE-2023-52845, CVE-2024-26704, CVE-2024-35807, CVE-2023-28746, CVE-2024-39476, CVE-2024-36941, CVE-2024-35938, CVE-2024-27025, CVE-2024-39276, CVE-2023-52777, CVE-2023-52796, CVE-2024-38596, CVE-2023-52463, CVE-2021-47579, CVE-2024-33621, CVE-2023-52832, CVE-2024-26878, CVE-2024-26840, CVE-2024-26921, CVE-2024-26772, CVE-2021-47018, CVE-2024-35925, CVE-2024-35924, CVE-2024-36933, CVE-2024-36286, CVE-2023-52864, CVE-2024-26660, CVE-2021-47373, CVE-2024-35893, CVE-2024-36940, CVE-2024-27019, CVE-2024-36929, CVE-2024-38627, CVE-2024-36921, CVE-2023-52658, CVE-2023-52784, CVE-2024-36905, CVE-2024-36917, CVE-2023-52530, CVE-2024-26958, CVE-2024-36896, CVE-2024-38555, CVE-2023-52679, CVE-2024-36020, CVE-2024-36886, CVE-2024-36954, CVE-2024-21823, CVE-2024-31076, CVE-2023-52791, CVE-2024-40927, CVE-2023-52762, CVE-2024-36960, CVE-2024-36025, CVE-2023-52451, CVE-2024-26802, CVE-2024-36016, CVE-2023-52471, CVE-2024-36489, CVE-2024-35930, CVE-2024-26961, CVE-2024-36971, CVE-2024-26733, CVE-2024-2201, CVE-2024-40974, CVE-2024-27065, CVE-2024-27388, CVE-2024-35810, CVE-2024-26940, CVE-2024-38538, CVE-2024-35910, CVE-2024-36006, CVE-2022-48632, CVE-2024-36889, CVE-2024-26773, CVE-2024-26614, CVE-2023-52803, CVE-2024-35801, CVE-2023-52622, CVE-2024-35824, CVE-2023-52775, CVE-2024-26740, CVE-2024-26870, CVE-2024-36904, CVE-2024-26843, CVE-2021-47548, CVE-2024-26837, CVE-2024-35958, CVE-2024-36886, CVE-2024-36270, CVE-2024-36957, CVE-2024-38593, CVE-2021-47596, CVE-2022-48627, CVE-2024-27435, CVE-2024-38663, CVE-2024-27397, CVE-2024-38586, CVE-2023-52638, CVE-2024-38543, CVE-2024-26783, CVE-2024-26858, CVE-2024-5564, CVE-2024-28182, CVE-2024-32487, CVE-2024-26735, CVE-2024-26993, CVE-2023-52667, CVE-2024-27393, CVE-2024-35870, CVE-2024-26801, CVE-2023-52626, CVE-2024-26974, CVE-2024-35960, CVE-2021-47400, CVE-2024-33601, CVE-2024-33602, CVE-2024-33600, CVE-2024-2961, CVE-2024-33599, CVE-2023-6597, CVE-2024-0450, CVE-2024-25743, CVE-2023-6240, CVE-2024-25742 BSA-2025-2895This hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies odporúča všetkým svojim zákazníkom, aby sa riadili nielen základným skóre CVSS, ale aj prechodným skóre a skóre závažnosti v konkrétnych prostrediach, na základe ktorého môžu vyhodnotiť celkové riziko vo vlastnom prostredí.

Dotknuté produkty a riešenie problému

Product Affected Versions Remediated Versions Link
Connectrix SANnav Versions prior to 2.3.1a Version 2.3.1b or later https://www.dell.com/support/product-details/product/connectrix-sannav/drivers

 

Product Affected Versions Remediated Versions Link
Connectrix SANnav Versions prior to 2.3.1a Version 2.3.1b or later https://www.dell.com/support/product-details/product/connectrix-sannav/drivers

 

História revízií

RevisionDateDescription
1.02025-05-06Initial Release

 

Súvisiace informácie

Dotknuté produkty

Connectrix, Connectrix B-Series Software, Connectrix SANnav
Vlastnosti článku
Číslo článku: 000317792
Typ článku: Dell Security Advisory
Dátum poslednej úpravy: 06 máj 2025
Nájdite odpovede na svoje otázky od ostatných používateľov spoločnosti Dell
Služby podpory
Skontrolujte, či sa na vaše zariadenie vzťahujú služby podpory.