CVE-2024-10394
14.11.2024, 20:15
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.

Debian Releases

Ubuntu Releases