cvelist/2024/0xxx/CVE-2024-0217.json

151 lines
6.2 KiB
JSON
Raw Normal View History

2024-01-03 14:00:37 +00:00
{
2024-01-03 18:00:36 +00:00
"data_version": "4.0",
2024-01-03 14:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-0217",
2024-01-03 18:00:36 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2024-01-03 14:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-03 18:00:36 +00:00
"value": "A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free",
"cweId": "CWE-416"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-01-04 07:00:38 +00:00
"defaultStatus": "affected"
2024-01-03 18:00:36 +00:00
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-01-04 07:00:38 +00:00
"defaultStatus": "affected"
2024-01-03 18:00:36 +00:00
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0217",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-0217"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256624",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2256624"
2024-01-25 16:00:36 +00:00
},
{
"url": "https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79",
"refsource": "MISC",
"name": "https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79"
2024-01-03 18:00:36 +00:00
}
]
},
2024-01-04 08:00:38 +00:00
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
2024-01-03 18:00:36 +00:00
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Thibault Guittet (Red Hat)."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
2024-01-03 14:00:37 +00:00
}
]
}
}