CVE-2024-10394
14.11.2024, 20:15
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.Enginsight
| Vendor | Product | Version |
|---|---|---|
| openafs | openafs | 1.0 ≤ 𝑥 < 1.6.25 |
| openafs | openafs | 1.8.0 ≤ 𝑥 < 1.8.13 |
| openafs | openafs | 1.9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases