{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-10396","assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","state":"PUBLISHED","assignerShortName":"fedora","dateReserved":"2024-10-25T19:25:45.524Z","datePublished":"2024-11-14T19:30:53.832Z","dateUpdated":"2025-12-23T15:11:01.105Z"},"containers":{"cna":{"providerMetadata":{"orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora","dateUpdated":"2025-12-23T15:11:01.105Z"},"title":"Fileserver crash and possible information leak on StoreACL/FetchACL","datePublic":"2024-11-12T03:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-772","description":"CWE-772 Missing Release of Resource after Effective Lifetime","type":"CWE"}]}],"affected":[{"vendor":"The OpenAFS Foundation","product":"OpenAFS","collectionURL":"https://github.com/openafs/openafs/","packageName":"openafs","versions":[{"status":"affected","version":"1.0","lessThan":"1.6.24","versionType":"semver"},{"status":"affected","version":"1.8.0","lessThan":"1.8.12.2","versionType":"semver"},{"status":"affected","version":"1.9.0","lessThan":"1.9.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash, possibly expose uninitialized memory, and possibly store garbage data in the audit log. Malformed ACLs provided in responses to client FetchACL RPCs can cause client processes to crash and possibly expose uninitialized memory into other ACLs stored on the server.","supportingMedia":[{"type":"text/html","base64":false,"value":"An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash, possibly expose uninitialized memory, and possibly store garbage data in the audit log. Malformed ACLs provided in responses to client FetchACL RPCs can cause client processes to crash and possibly expose uninitialized memory into other ACLs&nbsp;stored on the server."}]}],"references":[{"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-002.txt"},{"url":"https://www.openafs.org/security"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-19T15:58:56.619532Z","id":"CVE-2024-10396","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-21T16:10:33.073Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00019.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:29:09.042Z"}}]}}