CVE-2024-10394

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-10394
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10394.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-10394
Related
Published
2024-11-14T20:15:20Z
Modified
2025-02-14T23:49:33.108667Z
Summary
[none]
Details

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.

References

Affected packages

Debian:11 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.6-5
1.8.8-1
1.8.8-2
1.8.8-3
1.8.8.1-1
1.8.8.1-2
1.8.8.1-3
1.8.9-1
1.8.10-1
1.8.10-2
1.8.10-2.1~exp1
1.8.10-2.1
1.8.10-2.2
1.8.12~pre1-1
1.8.12.1-1
1.8.13-1
1.8.13.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.9-1+deb12u1

Affected versions

1.*

1.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.13-1

Affected versions

1.*

1.8.9-1
1.8.10-1
1.8.10-2
1.8.10-2.1~exp1
1.8.10-2.1
1.8.10-2.2
1.8.12~pre1-1
1.8.12.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}