MGASA-2025-0013

Source
https://advisories.mageia.org/MGASA-2025-0013.html
Import Source
https://advisories.mageia.org/MGASA-2025-0013.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0013
Related
Published
2025-01-18T01:31:28Z
Modified
2025-01-18T01:04:21Z
Summary
Updated openafs packages fix security vulnerabilities
Details

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client. (CVE-2024-10394) An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash. (CVE-2024-10396) A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code. (CVE-2024-10397)

References
Credits

Affected packages

Mageia:9 / openafs

Package

Name
openafs
Purl
pkg:rpm/mageia/openafs?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.13.1-1.mga9

Ecosystem specific

{
    "section": "core"
}