UBUNTU-CVE-2024-0217

Source
https://ubuntu.com/security/CVE-2024-0217
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-0217.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2024-0217
Related
Published
2024-01-03T17:15:00Z
Modified
2025-01-13T10:24:46Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.

References

Affected packages

Ubuntu:Pro:16.04:LTS / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@0.8.17-4ubuntu6~gcc5.4ubuntu1.5?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8.17-4ubuntu6~gcc5.3
0.8.17-4ubuntu6~gcc5.4ubuntu1
0.8.17-4ubuntu6~gcc5.4ubuntu1.1
0.8.17-4ubuntu6~gcc5.4ubuntu1.2
0.8.17-4ubuntu6~gcc5.4ubuntu1.3
0.8.17-4ubuntu6~gcc5.4ubuntu1.4
0.8.17-4ubuntu6~gcc5.4ubuntu1.5

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}

Ubuntu:Pro:18.04:LTS / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.1.9-1ubuntu2.18.04.6?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.7-1
1.1.9-1
1.1.9-1ubuntu1
1.1.9-1ubuntu2
1.1.9-1ubuntu2.18.04.1
1.1.9-1ubuntu2.18.04.3
1.1.9-1ubuntu2.18.04.4
1.1.9-1ubuntu2.18.04.5
1.1.9-1ubuntu2.18.04.6

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}

Ubuntu:20.04:LTS / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.1.13-2ubuntu1.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.12-5ubuntu4
1.1.13-1
1.1.13-2
1.1.13-2build1
1.1.13-2ubuntu1
1.1.13-2ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}

Ubuntu:22.04:LTS / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.2.5-2ubuntu3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.2-2ubuntu3
1.2.4-1ubuntu1
1.2.4-1ubuntu2
1.2.5-1ubuntu1
1.2.5-2ubuntu1
1.2.5-2ubuntu2
1.2.5-2ubuntu3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}

Ubuntu:24.10 / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.3.0-1ubuntu1?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.8-2build3
1.3.0-1
1.3.0-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}

Ubuntu:24.04:LTS / packagekit

Package

Name
packagekit
Purl
pkg:deb/ubuntu/packagekit@1.2.8-2ubuntu1.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.7-1
1.2.8-1
1.2.8-1build1
1.2.8-2
1.2.8-2build2
1.2.8-2build3
1.2.8-2ubuntu1
1.2.8-2ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Likely only a denial of service issue"
}