CVE-2024-10394

A local user can bypass the OpenAFS PAG (Process Authentication Group)
throttling mechanism in Unix clients, allowing the user to create a PAG using
an existing id number, effectively joining the PAG and letting the user steal
the credentials in that PAG.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
fedoraCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
VendorProductVersion
openafsopenafs
1.0 ≤
𝑥
< 1.6.25
openafsopenafs
1.8.0 ≤
𝑥
< 1.8.13
openafsopenafs
1.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openafs
bullseye
vulnerable
bullseye (security)
1.8.6-5+deb11u1
fixed
bookworm
1.8.9-1+deb12u1
fixed
bookworm (security)
1.8.9-1+deb12u1
fixed
forky
1.8.13.2-1
fixed
sid
1.8.13.2-1
fixed
trixie
1.8.13.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openafs
plucky
not-affected
oracular
ignored
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage