CVE-2024-10394
14.11.2024, 20:15
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.Enginsight
Vendor | Product | Version |
---|---|---|
openafs | openafs | 1.0 ≤ 𝑥 < 1.6.25 |
openafs | openafs | 1.8.0 ≤ 𝑥 < 1.8.13 |
openafs | openafs | 1.9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases