A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
Workaround:
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:6837 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6840 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6842 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6843 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6844 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6846 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6847 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6848 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:9452 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-45770 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2310451 | issue tracking |