Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt |
|
Thu, 07 Aug 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:* cpe:2.3:a:openafs:openafs:1.9.0:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. | |
| Title | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: fedora
Published: 2024-11-14T19:07:50.492Z
Updated: 2024-11-21T16:11:52.222Z
Reserved: 2024-10-25T18:51:34.290Z
Link: CVE-2024-10394
Updated: 2024-11-19T15:59:36.199Z
Status : Analyzed
Published: 2024-11-14T20:15:20.777
Modified: 2025-08-07T18:58:16.823
Link: CVE-2024-10394
No data.