DSA-2025-136: Security Update for Dell SmartFabric Manager Multiple Third-Party Component Vulnerabilities

요약: Dell SmartFabric Manager remediation is available for multiple security vulnerabilities that could be exploited by malicious users to compromise the affected system.

이 문서는 다음에 적용됩니다. 이 문서는 다음에 적용되지 않습니다. 이 문서는 특정 제품과 관련이 없습니다. 모든 제품 버전이 이 문서에 나와 있는 것은 아닙니다.

영향

High

세부 정보

Third-party Component

CVEs

More Information

curl

CVE-2024-11053

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

glib2

CVE-2024-52533

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

gtk3

CVE-2024-6655

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

helm

CVE-2024-25620, CVE-2024-26147

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

avahi

CVE-2024-52616

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

expat

CVE-2024-50602

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

python3

CVE-2024-11168

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

libuv

CVE-2024-11168

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

shadow

CVE-2013-4235

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

wget

CVE-2024-10524

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

xen

CVE-2024-45817, CVE-2024-45818, CVE-2024-45819, CVE-2024-53241

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

kernel-default

CVE-2023-52766, CVE-2023-52778, CVE-2023-52800, CVE-2023-52881, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-52920, CVE-2023-52921, CVE-2023-52922, CVE-2023-6270, CVE-2024-26596, CVE-2024-26703, CVE-2024-26741, CVE-2024-26758, CVE-2024-26761, CVE-2024-26767, CVE-2024-26782, CVE-2024-26864, CVE-2024-26943, CVE-2024-26953, CVE-2024-27017, CVE-2024-27026, CVE-2024-27043, CVE-2024-27407, CVE-2024-35888, CVE-2024-35980, CVE-2024-36000, CVE-2024-36031, CVE-2024-36244, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36920, CVE-2024-36927, CVE-2024-36954, CVE-2024-36968, CVE-2024-38576, CVE-2024-38577, CVE-2024-38589, CVE-2024-38599, CVE-2024-40914, CVE-2024-41016, CVE-2024-41023, CVE-2024-41031, CVE-2024-41047, CVE-2024-41082, CVE-2024-42102, CVE-2024-42145, CVE-2024-44932, CVE-2024-44958, CVE-2024-44964, CVE-2024-44995, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46680, CVE-2024-46681, CVE-2024-46721, CVE-2024-46754, CVE-2024-46765, CVE-2024-46766, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46788, CVE-2024-46797, CVE-2024-46800, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46830, CVE-2024-46831, CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46845, CVE-2024-46846, CVE-2024-46848, CVE-2024-46849, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47666, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47679, CVE-2024-47681, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687, CVE-2024-47688, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49853, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49863, CVE-2024-49864, CVE-2024-49866, CVE-2024-49867, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874, CVE-2024-49875, CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49888, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49898, CVE-2024-49899, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921, CVE-2024-49922, CVE-2024-49923, CVE-2024-49925, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49944, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49952, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49968, CVE-2024-49969, CVE-2024-49972, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976, CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49986, CVE-2024-49987, CVE-2024-49989, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003, CVE-2024-50004, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50012, CVE-2024-50013, CVE-2024-50014, CVE-2024-50015, CVE-2024-50017, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026, CVE-2024-50027, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064, CVE-2024-50067, CVE-2024-50069, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078, CVE-2024-50080, CVE-2024-50081, CVE-2024-50082, CVE-2024-50084, CVE-2024-50087, CVE-2024-50088, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50100, CVE-2024-50101, CVE-2024-50102, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50121, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50130, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50136, CVE-2024-50138, CVE-2024-50139, CVE-2024-50141, CVE-2024-50145, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50157, CVE-2024-50158, CVE-2024-50159, CVE-2024-50160, CVE-2024-50166, CVE-2024-50167, CVE-2024-50169, CVE-2024-50171, CVE-2024-50172, CVE-2024-50175, CVE-2024-50176, CVE-2024-50177, CVE-2024-50179, CVE-2024-50180, CVE-2024-50181, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50200, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50210, CVE-2024-50215, CVE-2024-50216, CVE-2024-50218, CVE-2024-50221, CVE-2024-50224, CVE-2024-50225, CVE-2024-50229, CVE-2024-50230, CVE-2024-50231, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50240, CVE-2024-50245, CVE-2024-50246, CVE-2024-50248, CVE-2024-50249, CVE-2024-50250, CVE-2024-50252, CVE-2024-50255, CVE-2024-50257, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50275, CVE-2024-50276, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042, CVE-2024-53043, CVE-2024-53045, CVE-2024-53048, CVE-2024-53051, CVE-2024-53052, CVE-2024-53055, CVE-2024-53056, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53072, CVE-2024-53074, CVE-2024-53076, CVE-2024-53079, CVE-2024-53081, CVE-2024-53082, CVE-2024-53085, CVE-2024-53088, CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53096, CVE-2024-53100, CVE-2024-53101, CVE-2024-53104, CVE-2024-53106, CVE-2024-53108, CVE-2024-53110, CVE-2024-53112, CVE-2024-53114, CVE-2024-53121, CVE-2024-53138

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

kernel

CVE-2024-26924, CVE-2024-27397, CVE-2024-35839, CVE-2024-36908, CVE-2024-36915, CVE-2024-39480, CVE-2024-41042, CVE-2024-44934, CVE-2024-44996, CVE-2024-47678, CVE-2024-49854, CVE-2024-49884, CVE-2024-49915, CVE-2024-50016, CVE-2024-50018, CVE-2024-50039, CVE-2024-50047, CVE-2024-50143, CVE-2024-50154, CVE-2024-50202, CVE-2024-50203, CVE-2024-50211, CVE-2024-50228, CVE-2024-50256, CVE-2024-50262, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-53050, CVE-2024-53064, CVE-2024-53090, CVE-2024-53095, CVE-2024-53099, CVE-2024-53103, CVE-2024-53105, CVE-2024-53111, CVE-2024-53113, CVE-2024-53117, CVE-2024-53118, CVE-2024-53119, CVE-2024-53120, CVE-2024-53122, CVE-2024-53125, CVE-2024-53126, CVE-2024-53127, CVE-2024-53129, CVE-2024-53130, CVE-2024-53131, CVE-2024-53133, CVE-2024-53134, CVE-2024-53136, CVE-2024-53141, CVE-2024-53142, CVE-2024-53144, CVE-2024-53146, CVE-2024-53148, CVE-2024-53150, CVE-2024-53151, CVE-2024-53154, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53158, CVE-2024-53159, CVE-2024-53160, CVE-2024-53161, CVE-2024-53162, CVE-2024-53166, CVE-2024-53169, CVE-2024-53171, CVE-2024-53173, CVE-2024-53174, CVE-2024-53179, CVE-2024-53180, CVE-2024-53188, CVE-2024-53190, CVE-2024-53191, CVE-2024-53200, CVE-2024-53201, CVE-2024-53202, CVE-2024-53206, CVE-2024-53207, CVE-2024-53208, CVE-2024-53209, CVE-2024-53210, CVE-2024-53213, CVE-2024-53214, CVE-2024-53215, CVE-2024-53216, CVE-2024-53217, CVE-2024-53222, CVE-2024-53224, CVE-2024-53229, CVE-2024-53234, CVE-2024-53237, CVE-2024-53240, CVE-2024-53241, CVE-2024-56536, CVE-2024-56539, CVE-2024-56549, CVE-2024-56551, CVE-2024-56562, CVE-2024-56566, CVE-2024-56567, CVE-2024-56576, CVE-2024-56582, CVE-2024-56599, CVE-2024-56604, CVE-2024-56605, CVE-2024-56645, CVE-2024-56667, CVE-2024-56752, CVE-2024-56754, CVE-2024-56755, CVE-2024-56756, CVE-2024-8805

https://nvd.nist.gov/vuln/searchThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies는 모든 고객이 CVSS 기본 점수와 관련 임시 및 환경 점수를 모두 고려할 것을 권장합니다. 이 경우 특정 보안 취약성과 관련된 잠재적인 심각도에 영향을 미칠 수 있습니다.

영향을 받는 제품 및 문제 해결

Product

Affected Versions

Remediated Versions

Link

Dell SmartFabric Manager

Versions 1.0.0 and 1.1.0

1.2.0 or later

SmartFabric Manager Downloads

 

Product

Affected Versions

Remediated Versions

Link

Dell SmartFabric Manager

Versions 1.0.0 and 1.1.0

1.2.0 or later

SmartFabric Manager Downloads

 

The Affected Products and Remediation table above may not be a comprehensive list of all affected supported versions and may be updated as more information becomes available.

개정 내역

Revision

Date

Description

1.0

2025-03-18

Initial Release

 

관련 정보

해당 제품

SmartFabric Manager
문서 속성
문서 번호: 000296560
문서 유형: Dell Security Advisory
마지막 수정 시간: 18 3월 2025
다른 Dell 사용자에게 질문에 대한 답변 찾기
지원 서비스
디바이스에 지원 서비스가 적용되는지 확인하십시오.