Mageia 2025-0013: openafs Security Advisory Updates
Summary
A local user can bypass the OpenAFS PAG (Process Authentication Group)
throttling mechanism in Unix client. (CVE-2024-10394)
An authenticated user can provide a malformed ACL to the fileserver's
StoreACL RPC, causing the fileserver to crash. (CVE-2024-10396)
A malicious server can crash the OpenAFS cache manager and other client
utilities, and possibly execute arbitrary code. (CVE-2024-10397)
References
- https://bugs.mageia.org/show_bug.cgi?id=33916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397
Resolution
MGASA-2025-0013 - Updated openafs packages fix security vulnerabilities
SRPMS
- 9/core/openafs-1.8.13.1-1.mga9