First published: Mon Nov 12 2012(Updated: )
A security flaw was found in the way Performance Co-Pilot (PCP), a framework and services to support system-level performance monitoring and performance management, performed management of its temporary files used by various services from the suite. A local attacker could use this flaw to conduct symbolic link attacks (alter or remove different system files, accessible with the privileges of the user running the PCP suite, than it was originally intended). References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=782967">https://bugzilla.novell.com/show_bug.cgi?id=782967</a> (private)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sgi Performance Co-pilot | <=3.6.9 | |
Sgi Performance Co-pilot | =2.1.1 | |
Sgi Performance Co-pilot | =2.1.2 | |
Sgi Performance Co-pilot | =2.1.3 | |
Sgi Performance Co-pilot | =2.1.4 | |
Sgi Performance Co-pilot | =2.1.5 | |
Sgi Performance Co-pilot | =2.1.6 | |
Sgi Performance Co-pilot | =2.1.7 | |
Sgi Performance Co-pilot | =2.1.8 | |
Sgi Performance Co-pilot | =2.1.9 | |
Sgi Performance Co-pilot | =2.1.10 | |
Sgi Performance Co-pilot | =2.1.11 | |
Sgi Performance Co-pilot | =2.2 | |
Sgi Performance Co-pilot | =3.6.4 | |
Sgi Performance Co-pilot | =3.6.5 | |
Sgi Performance Co-pilot | =3.6.6 | |
Sgi Performance Co-pilot | =3.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.