First published: Wed Jan 03 2024(Updated: )
A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/PackageKit | <1.2.7 | 1.2.7 |
Ubuntu Packagekit | <1.2.7 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0217 is classified with a high severity due to the potential for exploitation through use-after-free vulnerabilities.
To address CVE-2024-0217, update PackageKit to version 1.2.7 or later.
CVE-2024-0217 affects PackageKit versions prior to 1.2.7 on Red Hat Enterprise Linux 8.0, 9.0, and Fedora 39.
A use-after-free vulnerability occurs when memory is accessed after it has been freed, potentially leading to unpredictable behavior or crashes.
Yes, CVE-2024-0217 could potentially be exploited remotely if an attacker can manipulate transactions within the affected PackageKit service.