CVE-2024-54505

Source
https://cve.org/CVERecord?id=CVE-2024-54505
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-54505.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-54505
Downstream
Related
Published
2024-12-12T02:15:31.227Z
Modified
2026-02-18T08:35:19.911966Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A type confusion issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to memory corruption.

References

Affected packages

Git / github.com/powershell/win32-openssh

Affected ranges

Type
GIT
Repo
https://github.com/powershell/win32-openssh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
10_13_2015
11_09_2015
12_22_2015

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-54505.json"

Git / github.com/rapier1/hpn-ssh

Affected ranges

Type
GIT
Repo
https://github.com/rapier1/hpn-ssh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
ABOUT_TO_ADD_INET_ATON
AFTER_FREEBSD_PAM_MERGE
AFTER_KRB5_GSSAPI_MERGE
BEFORE_FREEBSD_PAM_MERGE
BEFORE_KRB5_GSSAPI_MERGE
POST_KRB4_REMOVAL
PRE-REORDER
PRE_CYGWIN_MERGE
PRE_DAN_PATCH_MERGE
PRE_FIXPATHS_INTEGRATION
PRE_HPUX_INTEGRATION
PRE_IPV6
PRE_KRB4_REMOVAL
PRE_NEW_LOGIN_CODE
PRE_SW_KRBV
V_1_2PRE17
V_1_2_1_PRE18
V_1_2_1_PRE19
V_1_2_1_PRE20
V_1_2_1_PRE21
V_1_2_1_PRE22
V_1_2_1_PRE23
V_1_2_1_PRE24
V_1_2_1_PRE25
V_1_2_1_PRE26
V_1_2_1_PRE27
V_1_2_2
V_1_2_2_P1
V_1_2_2_PRE28
V_1_2_2_PRE29
V_1_2_3
V_1_2_3_PRE1
V_1_2_3_PRE2
V_1_2_3_PRE3
V_1_2_3_PRE4
V_1_2_3_PRE5
V_1_2_3_TEST1
V_1_2_3_TEST2
V_1_2_3_TEST3
V_1_2_PRE10
V_1_2_PRE11
V_1_2_PRE12
V_1_2_PRE13
V_1_2_PRE14
V_1_2_PRE15
V_1_2_PRE16
V_1_2_PRE4
V_1_2_PRE5
V_1_2_PRE6
V_1_2_PRE7
V_1_2_PRE8
V_1_2_PRE9
V_2_0_0_BETA1
V_2_0_0_BETA2
V_2_0_0_TEST1
V_2_1_0
V_2_1_0_P1
V_2_1_0_P2
V_2_1_0_P3
V_2_1_1_P1
V_2_1_1_P2
V_2_1_1_P3
V_2_1_1_P4
V_2_2_0_P1
V_2_3_0_P1
V_2_5_0_P1
V_2_5_1_P1
V_2_5_1_P2
V_2_5_2_P1
V_3_0_1_P1
V_3_0_P1
V_3_1_P1
V_3_2_2_P1
V_3_4_P1
V_3_6_1_P1
V_3_8_P1
V_3_9_P1
V_4_2_P1
V_5_0_P1
V_5_1_P1
V_5_2_P1
V_5_5_P1
V_5_7_P1
V_6_0_P1
V_6_1_P1
V_6_2_P1
V_6_5_P1
V_6_6_P1
V_6_8_P1
V_6_9_P1
V_7_0_P1
V_7_1_P1
V_7_1_P2
V_7_2_P1
V_7_2_P2
V_7_3_P1
V_7_4_P1
V_7_5_P1
V_7_6_P1
V_7_7_P1
V_7_8_P1
V_7_9_P1
V_8_0_P1
V_8_1_P1
V_8_2_P1
V_8_3_P1
V_8_4_P1
V_8_5_P1
V_8_6_P1
V_8_7_P1
V_8_8_P1
V_8_9_P1
V_9_0_P1
V_9_1_P1
V_9_2_P1
V_9_3_P1
V_9_3_P2
V_9_4_P1
V_9_5_P1
hpn-7_1_P1
hpn-7_1_P2
hpn-7_2_P2
hpn-7_3_P1
hpn-8_5_P1
hpn-8_6_P1
hpn-8_7_P1
hpn-8_8_P1
hpn-8_8_prefix
hpn-9_3_P1
hpn-9_3_P2
hpn-9_4_P1
hpn-AES-CTR-7_1_P2
hpn-AES-CTR-7_2_P2
hpn-AES-CTR-7_3_P1
hpn-AES-CTR-7_4_P1
hpn-AES-CTR-7_5_P1
hpn-KitchenSink-7_1_P1
hpn-KitchenSink-7_2_P2
hpn-KitchenSink-7_4_P1
hpn-KitchenSink-8_5_P1
hpn-PeakTput-7_1_P2
hpn-PeakTput-7_2_P2
hpn-PeakTput-7_3_P1
hpn-PeakTput-7_4_P1
hpn-PeakTput-7_5_P1
hpn-PeakTput-7_6_P1
hpn-PeakTput-7_7_P1
hpn-SCPResume-8_5_P1
hpn-ServerLog-6_8_P1
hpn-ServerLog-7_1_P2
hpn-ServerLog-7_2_P2
hpn-ServerLog-7_3_P1
hpn-ServerLog-7_4_P1
hpn-ServerLog-7_5_P1
hpn-18.*
hpn-18.1.0
v18.*
v18.1.0-test

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-54505.json"