CVE-2024-0217
Publication date 3 January 2024
Last updated 27 April 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.
Read the notes from the security team
Why is this CVE low priority?
Likely only a denial of service issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| packagekit | 26.04 LTS resolute |
Vulnerable, fix deferred
|
| 25.10 questing |
Vulnerable, fix deferred
|
|
| 24.04 LTS noble |
Vulnerable, fix deferred
|
|
| 22.04 LTS jammy |
Vulnerable, fix deferred
|
|
| 20.04 LTS focal |
Vulnerable, fix deferred
|
|
| 18.04 LTS bionic |
Vulnerable, fix deferred
|
|
| 16.04 LTS xenial |
Vulnerable, fix deferred
|
|
| 14.04 LTS trusty | Ignored end of standard support |
Notes
mdeslaur
as of 2026-04-27, no indication what this issue is, and if there is a fix for it. See Red Hat bug.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |