[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Dec 12 16:16:42 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f3211ade by Moritz Muehlenhoff at 2024-12-12T17:14:37+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,5 @@
+CVE-2024-55633
+	NOT-FOR-US: Apache Superset
 CVE-2024-9881 (The LearnPress  WordPress plugin before 4.2.7.2 does not sanitise and  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-9641 (The LuckyWP Table of Contents WordPress plugin before 2.1.7 does not s ...)
@@ -17,87 +19,87 @@ CVE-2024-55657 (SiYuan is a personal knowledge management system. Prior to versi
 CVE-2024-55652 (PenDoc is a penetration testing reporting application. Prior to commit ...)
 	NOT-FOR-US: PenDoc
 CVE-2024-54534 (The issue was addressed with improved memory handling. This issue is f ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54531 (The issue was addressed with improved memory handling. This issue is f ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54529 (A logic issue was addressed with improved checks. This issue is fixed  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54528 (A logic issue was addressed with improved restrictions. This issue is  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54527 (This issue was addressed with improved checks. This issue is fixed in  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54526 (The issue was addressed with improved checks. This issue is fixed in w ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54524 (A logic issue was addressed with improved file handling. This issue is ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54515 (A logic issue was addressed with improved restrictions. This issue is  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54514 (The issue was addressed with improved checks. This issue is fixed in w ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54513 (A permissions issue was addressed with additional restrictions. This i ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54510 (A race condition was addressed with improved locking. This issue is fi ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54508 (The issue was addressed with improved memory handling. This issue is f ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54506 (An out-of-bounds access issue was addressed with improved bounds check ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54505 (A type confusion issue was addressed with improved memory handling. Th ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54504 (A privacy issue was addressed with improved private data redaction for ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54503 (An inconsistent user interface issue was addressed with improved state ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54502 (The issue was addressed with improved checks. This issue is fixed in w ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54501 (The issue was addressed with improved checks. This issue is fixed in i ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54500 (The issue was addressed with improved checks. This issue is fixed in i ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54498 (A path handling issue was addressed with improved validation. This iss ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54495 (The issue was addressed with improved permissions logic. This issue is ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54494 (A race condition was addressed with additional validation. This issue  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54493 (This issue was addressed through improved state management. This issue ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54492 (This issue was addressed by using HTTPS when sending information over  ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54491 (The issue was resolved by sanitizing logging This issue is fixed in ma ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54490 (This issue was addressed by enabling hardened runtime. This issue is f ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54489 (A path handling issue was addressed with improved validation. This iss ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54486 (The issue was addressed with improved checks. This issue is fixed in i ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54485 (The issue was addressed by adding additional logic. This issue is fixe ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54484 (The issue was resolved by sanitizing logging. This issue is fixed in m ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54479 (The issue was addressed with improved checks. This issue is fixed in i ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54477 (The issue was addressed with improved checks. This issue is fixed in m ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54476 (The issue was addressed with improved checks. This issue is fixed in m ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54474 (The issue was addressed with improved checks. This issue is fixed in m ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54471 (This issue was addressed with additional entitlement checks. This issu ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54466 (An authorization issue was addressed with improved state management. T ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-54465 (A logic issue was addressed with improved state management. This issue ...)
-	TODO: check
+	NOT-FOR-US: Apple
 CVE-2024-53845 (ESPTouch is a connection protocol for internet of things devices. In t ...)
-	TODO: check
+	NOT-FOR-US: ESPTouch
 CVE-2024-53274 (Habitica is an open-source habit-building program. Versions prior to 5 ...)
-	TODO: check
+	NOT-FOR-US: Habitica
 CVE-2024-53273 (Habitica is an open-source habit-building program. Versions prior to 5 ...)
-	TODO: check
+	NOT-FOR-US: Habitica
 CVE-2024-53272 (Habitica is an open-source habit-building program. Versions prior to 5 ...)
-	TODO: check
+	NOT-FOR-US: Habitica
 CVE-2024-45404 (OpenCTI is an open-source cyber threat intelligence platform. In versi ...)
 	NOT-FOR-US: OpenCTI
 CVE-2024-44300 (A logic issue was addressed with improved file handling. This issue is ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f3211ade417855045952fab9898f7e2e55c90c4d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f3211ade417855045952fab9898f7e2e55c90c4d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241212/f4531904/attachment.htm>


More information about the debian-security-tracker-commits mailing list