{"affected":[{"ecosystem_specific":{"binaries":[{"libpcp3":"6.2.0-1.1","libpcp_import1":"6.2.0-1.1","pcp-conf":"6.2.0-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"pcp","purl":"pkg:rpm/suse/pcp&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.2.0-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for pcp fixes the following issues:\n\n- CVE-2024-45770: Fixed `pmpost` symlink attack allowing escalating `pcp` to `root` user (bsc#1230552).\n- CVE-2024-45769: Fixed `pmcd` heap corruption through metric pmstore operations (bsc#1230551).\n- CVE-2024-3019: Fixed exposure of the redis backend server allowing remote command execution via pmproxy (bsc#1222121).\n- CVE-2023-6917: Fixed Local privilege escalation from pcp user to root in /usr/libexec/pcp/lib/pmproxy (bsc#1217826).\n\nOther fixes:\n- Updated to version 6.2.0\n\n\n","id":"SUSE-SU-2025:20133-1","modified":"2025-03-05T16:01:50Z","published":"2025-03-05T16:01:50Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520133-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1069468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217826"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230551"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230552"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-3019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45770"}],"related":["CVE-2023-6917","CVE-2024-3019","CVE-2024-45769","CVE-2024-45770"],"summary":"Security update for pcp","upstream":["CVE-2023-6917","CVE-2024-3019","CVE-2024-45769","CVE-2024-45770"]}