4.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Pcp: pmpost symlink attack allows escalating pcp to root user
A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
References
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6844 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6846 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6847 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6848 vendor-advisory x_refsource_REDHAT
- RHSA-2024:9452 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45770 x_refsource_REDHAT vdb-entry
- RHBZ#2310451 issue-tracking x_refsource_REDHAT
- RHSA-2024:6837 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6840 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6842 vendor-advisory x_refsource_REDHAT
- RHSA-2024:6843 vendor-advisory x_refsource_REDHAT
Affected products
- *
Matching in nixpkgs
pkgs.pcp
Command line peer-to-peer data transfer tool based on libp2p
-
nixos-unstable -
- nixpkgs-unstable 0.4.0
pkgs.ncmpcpp
Featureful ncurses based MPD client inspired by ncmpc
-
nixos-unstable -
- nixpkgs-unstable 0.10.1
pkgs.libamqpcpp
Library for communicating with a RabbitMQ server
-
nixos-unstable -
- nixpkgs-unstable 4.3.27
pkgs.python312Packages.pcpp
C99 preprocessor written in pure Python
-
nixos-unstable -
- nixpkgs-unstable 1.30
pkgs.python313Packages.pcpp
C99 preprocessor written in pure Python
-
nixos-unstable -
- nixpkgs-unstable 1.30
Package maintainers
-
@MikePlayle Mike Playle <mike@mythik.co.uk>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@k0ral Koral <koral@mailoo.org>
-
@MatthewCroughan Matthew Croughan <matt@croughan.sh>
-
@Rakesh4G Rakesh Gupta <rakeshgupta4u@gmail.com>