First published: Thu Jul 19 2012(Updated: )
Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sgi Performance Co-pilot | <=3.6.4 | |
Sgi Performance Co-pilot | =2.1.1 | |
Sgi Performance Co-pilot | =2.1.2 | |
Sgi Performance Co-pilot | =2.1.3 | |
Sgi Performance Co-pilot | =2.1.4 | |
Sgi Performance Co-pilot | =2.1.5 | |
Sgi Performance Co-pilot | =2.1.6 | |
Sgi Performance Co-pilot | =2.1.7 | |
Sgi Performance Co-pilot | =2.1.8 | |
Sgi Performance Co-pilot | =2.1.9 | |
Sgi Performance Co-pilot | =2.1.10 | |
Sgi Performance Co-pilot | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.