### [CVE-2024-10394](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394) ![](https://img.shields.io/static/v1?label=Product&message=OpenAFS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.8.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.9.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20Integer%20Overflow%20or%20Wraparound&color=brightgreen) ### Description A local user can bypass the OpenAFS PAG (Process Authentication Group)throttling mechanism in Unix clients, allowing the user to create a PAG usingan existing id number, effectively joining the PAG and letting the user stealthe credentials in that PAG. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security