CVE-2024-10394

A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.9.0:*:*:*:*:*:*:*

History

07 Aug 2025, 18:58

Type Values Removed Values Added
References () https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt - () https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Openafs openafs
Openafs
CPE cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.9.0:*:*:*:*:*:*:*

21 Nov 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 0.0
v2 : unknown
v3 : unknown

19 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 0.0

15 Nov 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Un usuario local puede eludir el mecanismo de limitación de PAG (grupo de autenticación de procesos) de OpenAFS en clientes Unix, lo que le permite crear un PAG utilizando un número de identificación existente, uniéndose efectivamente al PAG y permitiendo al usuario robar las credenciales en ese PAG.

14 Nov 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-14 20:15

Updated : 2025-08-07 18:58


NVD link : CVE-2024-10394

Mitre link : CVE-2024-10394

CVE.ORG link : CVE-2024-10394


JSON object : View

Products Affected

openafs

  • openafs
CWE
CWE-190

Integer Overflow or Wraparound