Untriaged
Permalink
CVE-2024-45769
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Pcp: pmcd heap corruption through metric pmstore operations
A vulnerability was found in Performance Co-Pilot (PCP). This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash.
References
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6840 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6842 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6843 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6844 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6846 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6847 x_refsource_REDHAT vendor-advisory
- RHSA-2024:6848 x_refsource_REDHAT vendor-advisory
- RHSA-2024:9452 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45769 x_refsource_REDHAT vdb-entry
- RHBZ#2310452 issue-tracking x_refsource_REDHAT
Affected products
pcp
- *
Matching in nixpkgs
pkgs.pcp
Command line peer-to-peer data transfer tool based on libp2p
-
nixos-unstable -
- nixpkgs-unstable 0.4.0
pkgs.ncmpcpp
Featureful ncurses based MPD client inspired by ncmpc
-
nixos-unstable -
- nixpkgs-unstable 0.10.1
pkgs.libamqpcpp
Library for communicating with a RabbitMQ server
-
nixos-unstable -
- nixpkgs-unstable 4.3.27
pkgs.python312Packages.pcpp
C99 preprocessor written in pure Python
-
nixos-unstable -
- nixpkgs-unstable 1.30
pkgs.python313Packages.pcpp
C99 preprocessor written in pure Python
-
nixos-unstable -
- nixpkgs-unstable 1.30
Package maintainers
-
@MikePlayle Mike Playle <mike@mythik.co.uk>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@k0ral Koral <koral@mailoo.org>
-
@MatthewCroughan Matthew Croughan <matt@croughan.sh>
-
@Rakesh4G Rakesh Gupta <rakeshgupta4u@gmail.com>