Package: openafs-client
Version: 1.8.12.1-1
Severity: serious
Tags: security upstream fixed-upstream patch
Control: clone -1 -2
Control: reassign -2 openafs-fileserver

Quoting upstream's release announcement
(https://lists.openafs.org/pipermail/openafs-devel/2024-November/020961.html):

OPENAFS-SA-2024-001 (CVE-2024-10394) affects cache managers where PAGs are
in use; an attacker with access to a multi-user system could retrieve and
use credentials from a preexisting PAG they are not authorized to access.

OPENAFS-SA-2024-002 (CVE-2024-10396) affects fileservers, with denial of
service and potential information disclosure from uninitialized memory
access being possible due to improper string handling in processing the
RXAFS_StoreACL RPC.  Analogous impact to clients is possible due to
improper string handling in processing the results of the RXAFS_FetchACL
RPC.

OPENAFS-SA-2024-003 (CVE-2024-10397) is a buffer overflow affecting certain
RPC clients (notably, cache manager and command-line client utilities).
Errors and denial of service (crashes) are the most common failure modes,
though for this class of memory-safety issue there is some potential that
heap manipulation could allow remote code execution.

Reply via email to