First published: Thu Nov 14 2024(Updated: )
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
Credit: patrick@puiterwijk.org
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.