pcp-4.3.2-12.el7
エラータID: AXSA:2020-703:06
acquisition, archiving, and analysis of system-level performance measurements.
Its light-weight distributed architecture makes it particularly well-suited to
centralized analysis of complex systems.
Security Fix(es):
pcp: Local privilege escalation in pcp spec file %post section
(CVE-2019-3695)
A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
pcp: Local privilege escalation in pcp spec file through migrate_tempdirs
(CVE-2019-3696)
A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
Update packages.
A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
N/A
SRPMS
- pcp-4.3.2-12.el7.src.rpm
MD5: 72b68effd03646b53c67b78e70e20821
SHA-256: c86249b415f2f7bcabebf2eddd498dedf319319ae77855a64eda02dd513d907f
Size: 42.43 MB
Asianux Server 7 for x86_64
- pcp-4.3.2-12.el7.x86_64.rpm
MD5: fd344be3bc891f716929eebfecaaf63f
SHA-256: 6476d39b8566d00981ea500499ed56e6950e2597d5bc0801dbf9216ce9463d22
Size: 1.05 MB - pcp-conf-4.3.2-12.el7.x86_64.rpm
MD5: bbdacc4621a755fe3f14b6a0162ab964
SHA-256: dbb80e764b9343c7d76293b5c245912e5efa84da79c9c091898ceeb39d1b06c1
Size: 36.19 kB - pcp-doc-4.3.2-12.el7.noarch.rpm
MD5: a326f1a18a035b81857cb3c293e388f3
SHA-256: 35406f0642f1eb9f4ad3a4fffbbed45032e84af3eceaa7fef1bfbfa327e0f83e
Size: 3.80 MB - pcp-export-pcp2graphite-4.3.2-12.el7.x86_64.rpm
MD5: 72f96f60937584a336b023c30a04432a
SHA-256: 756c8d9aa38a75235bfcb264a6f0f9ea36dd4721097e1771b24e91da3462e29d
Size: 27.03 kB - pcp-gui-4.3.2-12.el7.x86_64.rpm
MD5: beef88b499ddd5f8280da8630de15587
SHA-256: ccb8877439d49a46d0f45b8e37122f6db6d14f17b6823a7dbce27fe05b7152f6
Size: 799.91 kB - pcp-libs-4.3.2-12.el7.x86_64.rpm
MD5: 56dc6bd098f71e819ce26503d5399086
SHA-256: c3dc0e4c6332611865ff95c166c9bb6f332d86d797527e146e7dceaa1753a657
Size: 465.82 kB - pcp-manager-4.3.2-12.el7.x86_64.rpm
MD5: eca5a32653aa3abd39040ae46e5a0dc4
SHA-256: 2b88a3242d8a64b066b1a0225eb2f03715b2bd82d1feb8f454dab7f1a43e770e
Size: 76.52 kB - pcp-pmda-activemq-4.3.2-12.el7.x86_64.rpm
MD5: b51790679795c58f587528b8dec5157d
SHA-256: a471560da09dd08ca503fc43047abfaeb0e0872e8d626d42efd1ae866096d944
Size: 28.96 kB - pcp-pmda-apache-4.3.2-12.el7.x86_64.rpm
MD5: 467ac30e0f9651872faf461487b99c79
SHA-256: 24eff1d38f5418271f8374c7fd18d971dd18c41380a919f4c89daf44c3d412ac
Size: 32.54 kB - pcp-pmda-bash-4.3.2-12.el7.x86_64.rpm
MD5: 0dbc6873709d76900dbfa25ebfb3b4ac
SHA-256: 23f546b2c835d6446e54823a93697d7063c10607177133ae6cf03ef084349b5c
Size: 35.30 kB - pcp-pmda-bonding-4.3.2-12.el7.x86_64.rpm
MD5: 8d4851282d291073e84b87c2baba5131
SHA-256: 5dae45de42622bc5f745689872f005693484e3cfc34de86c547f7841497bce50
Size: 24.02 kB - pcp-pmda-cisco-4.3.2-12.el7.x86_64.rpm
MD5: e44ba0d3d96d4b6dd022a98b382c0235
SHA-256: 82aceeb5d5f5807331069196abbfbe013810fbd6f7f96f8460334871f389e759
Size: 44.79 kB - pcp-pmda-dbping-4.3.2-12.el7.x86_64.rpm
MD5: 4e47e25ed3df4fa37ba162b666df3927
SHA-256: 24a6ef52ae17541d5474a81e63d7009e5ac928e4a1aaff3eef61ad755c69b99c
Size: 24.95 kB - pcp-pmda-dm-4.3.2-12.el7.x86_64.rpm
MD5: 78a5756aee2d3a2424de839230d97124
SHA-256: 3f2824efe8231355b8a25c26ae564454eae5767df280f68e0436393932ad59f4
Size: 49.52 kB - pcp-pmda-ds389-4.3.2-12.el7.x86_64.rpm
MD5: 5697e0a3aa814ff0c0546ca2d82b4504
SHA-256: 63ba2523cabf096076fe8224dca6657c0029da0117b6a68347bffc7e26563831
Size: 24.61 kB - pcp-pmda-ds389log-4.3.2-12.el7.x86_64.rpm
MD5: 7dfe50ddac106de005addfd158f9e99f
SHA-256: 750902e850a836196b08dbdb3ddc07a76daed545def38f8e08488da98443cb85
Size: 24.92 kB - pcp-pmda-elasticsearch-4.3.2-12.el7.x86_64.rpm
MD5: 80bf635bf9e75a52d88198cdef1861cb
SHA-256: f5adb93d459259928f2711b90093c0c962a15c045515be9f9ecbd9182a165bd9
Size: 28.21 kB - pcp-pmda-gfs2-4.3.2-12.el7.x86_64.rpm
MD5: d1c0b9e9a290d018797074e9032fc90e
SHA-256: 26d30687b1b23eb4c301fff4edc97b4fd11ecf88bf3d66b98c8db5a68639e8d3
Size: 44.78 kB - pcp-pmda-gluster-4.3.2-12.el7.x86_64.rpm
MD5: cfb82cbc64f76d4e6e2f5d6d681432bc
SHA-256: 63b1815728e3033ba00f7eaec430ae52315f19180d412f873b157f63ed079a58
Size: 26.32 kB - pcp-pmda-gpfs-4.3.2-12.el7.x86_64.rpm
MD5: 76e705d18f771f12638b3ddeff236512
SHA-256: 87bbbd035654f7a05f57a822d795645a4e44b9473b1afd8b2465a73eca008658
Size: 24.61 kB - pcp-pmda-gpsd-4.3.2-12.el7.x86_64.rpm
MD5: a9a00d2c6453fd6147b8a32ec7f0949c
SHA-256: cce5aee32a69e458f115c8cf627e0b36bb2e75b098520d3cb3b52ecf2176be4d
Size: 24.84 kB - pcp-pmda-json-4.3.2-12.el7.x86_64.rpm
MD5: b23e8f04b79dacf90394552b17dd1840
SHA-256: b0d6c541f13bc8c48afdc8a2848b77a315ce1817216c613261634776f9d95546
Size: 37.69 kB - pcp-pmda-lmsensors-4.3.2-12.el7.x86_64.rpm
MD5: 70b813f2b92322ed778086b0e77a58dc
SHA-256: d3177bbd3254b62257167d45062cdb84cd9bbdb65ca952f3b5f257c1d4579a05
Size: 27.12 kB - pcp-pmda-logger-4.3.2-12.el7.x86_64.rpm
MD5: 1edd3b25438a07da13661cafb45a5b3f
SHA-256: e0dde297d01efe39befff436022f95f7ab65fbc3a8b934f245e1d90cbc2b5ce3
Size: 37.49 kB - pcp-pmda-lustre-4.3.2-12.el7.x86_64.rpm
MD5: d8d68d18c849b93db77d0552f4df5e22
SHA-256: 60dc49bf0748a8a46a5318ea76676bcc2133e31d0694334ed8ce7f0f08317bb2
Size: 25.74 kB - pcp-pmda-lustrecomm-4.3.2-12.el7.x86_64.rpm
MD5: b58f3998731db7ee29d1bcf1eb54f436
SHA-256: 32d572a8047ff598fcab4a741552735ac291d39d68df453999ec578b09390151
Size: 32.02 kB - pcp-pmda-mailq-4.3.2-12.el7.x86_64.rpm
MD5: 1eb733c4a89d96ccd788528d2b9ec7a9
SHA-256: d47b4727f243282bef9385be3dfd6713d912a6517b8d739d50c92708fd0c119b
Size: 31.91 kB - pcp-pmda-memcache-4.3.2-12.el7.x86_64.rpm
MD5: 55d70e656184747eaed4c2df361e0849
SHA-256: 64f4b40a7e6d147d9e0962fbc1aa8f4653f30b829311ee5b498c0ea4f1935d63
Size: 24.72 kB - pcp-pmda-mounts-4.3.2-12.el7.x86_64.rpm
MD5: d7b174ac345afcb8f5b97b15375e357d
SHA-256: 2e492bf9c27b0085f611c9d6c152d5ed876be7777db41a0c37afdc95610507ed
Size: 31.65 kB - pcp-pmda-mysql-4.3.2-12.el7.x86_64.rpm
MD5: 47fb682f910dc4bcaecb1164c2c59c47
SHA-256: 16db9e8d0693745db25f5da610ebcdba9dfc808d09256c3ae6c4cb913adbc2b5
Size: 30.95 kB - pcp-pmda-named-4.3.2-12.el7.x86_64.rpm
MD5: cb7703041e237ac010d0f29723052208
SHA-256: 19f12a5985774cb74a254f78b1693e330c969f8a6dd9d66f32b122ef852a5e4c
Size: 24.95 kB - pcp-pmda-netfilter-4.3.2-12.el7.x86_64.rpm
MD5: b2ffeba6e580dfb11b4887210940dec6
SHA-256: e4dd60641397203a5abb9f412daeb80f1ad9f904d759f93407d6fceb170de467
Size: 23.60 kB - pcp-pmda-news-4.3.2-12.el7.x86_64.rpm
MD5: 8ed405c505ea0cf50b09fc575ac017ab
SHA-256: 0a41d7ec82fdd085e0aada888d561c30d265a39820179f5589b0f9550f4b1872
Size: 25.78 kB - pcp-pmda-nfsclient-4.3.2-12.el7.x86_64.rpm
MD5: 6cc32c6303568dda6fa8b7bf6dfeafc6
SHA-256: 11369ccb586aac505b57b4d518e4514781511d465557a3fdf6f2fd1ff0f6a704
Size: 31.32 kB - pcp-pmda-nginx-4.3.2-12.el7.x86_64.rpm
MD5: a97016fe6fe0aa4c8cbe9f13d6810a0f
SHA-256: d9e72d747985bdecc3143a328b183021fe07314ad7e126a49a677e66f856c643
Size: 23.91 kB - pcp-pmda-nvidia-gpu-4.3.2-12.el7.x86_64.rpm
MD5: ef5c893bf2ce66a0a71f1410a4c534a6
SHA-256: 27151675fee7fab27a1b72c0589fca60a642c8a037cac740158f1360ec275c3e
Size: 38.17 kB - pcp-pmda-pdns-4.3.2-12.el7.x86_64.rpm
MD5: ba77733634d2ae2057697479ca8f87c7
SHA-256: e6ecc9c8f92a265a2d45f5b940ce54e8929fc26ab27301553e2cecdb281b08ba
Size: 25.51 kB - pcp-pmda-postfix-4.3.2-12.el7.x86_64.rpm
MD5: 8826b53219cfa59d220bcd34ede131fd
SHA-256: 1dc0436a7f2af987a28c7aec1259cbe305a76a819a489c8c327fdf0d217ac82f
Size: 25.05 kB - pcp-pmda-postgresql-4.3.2-12.el7.x86_64.rpm
MD5: 79eb30afe12cc1a6b0bc871b60f60b56
SHA-256: d47fcaec8bb158f016746a68a6de35f0ca3853053314021baf93728c81728264
Size: 32.59 kB - pcp-pmda-roomtemp-4.3.2-12.el7.x86_64.rpm
MD5: 85a68269d62e81c8b73e4cde8ce5ec0a
SHA-256: 7ef60a079f76b67b672279cdfc785e3d2b4d9d2d98484a0e0040e4e124aba2f0
Size: 37.43 kB - pcp-pmda-rpm-4.3.2-12.el7.x86_64.rpm
MD5: bf78ad1ae1ec04c296265e02ea631afc
SHA-256: 38a0fe327a745f91007155b52c565cefa2e2e4bbfea2b54ce49541b12846699b
Size: 36.04 kB - pcp-pmda-sendmail-4.3.2-12.el7.x86_64.rpm
MD5: 48cb017558960a39756aef8e9f4ff7fa
SHA-256: 3236b5cb2d670a462c8adda65c116453c7ca36c9aa9ff9b6ca9cddd5ee5fa2eb
Size: 35.48 kB - pcp-pmda-shping-4.3.2-12.el7.x86_64.rpm
MD5: 3b537468ab17cb425cd886e08b0a58cd
SHA-256: 5c91d020f99f0b5ac007c7ecc3735853add02eca14908218c33b60f2661a0ea7
Size: 37.96 kB - pcp-pmda-summary-4.3.2-12.el7.x86_64.rpm
MD5: 0ad5dad2a1e7154fc9d1df1fa20239f3
SHA-256: 056f6821548a280acd85cb8cf49328215129332312346f2167d27aec00427a86
Size: 35.86 kB - pcp-pmda-trace-4.3.2-12.el7.x86_64.rpm
MD5: 89709e918d422ba4d47e974f4fbcdecf
SHA-256: 962aa4d24d06e4891ec33902aaef80513702b1a397a6586bdaee70cdc2b695e7
Size: 43.39 kB - pcp-pmda-unbound-4.3.2-12.el7.x86_64.rpm
MD5: d0d5e6044957f155ebf5c176609458cc
SHA-256: 1b944c80fa84bcdce18903bab713fb6df77925c82ff718ef46d5f3121d5628bb
Size: 27.43 kB - pcp-pmda-weblog-4.3.2-12.el7.x86_64.rpm
MD5: 1baa83d71e986d415118fab23f464c3d
SHA-256: 6dfce818bc3ee78a37481bb23e3f050f1e1dcdbbed8057fa515efb158280147e
Size: 64.43 kB - pcp-pmda-zswap-4.3.2-12.el7.x86_64.rpm
MD5: cf720bdc5dd0a3de8b91d5060db5a74f
SHA-256: 9be8292e2d370d902f9407005cc27136aa807ef9e9d700a67f7f48999363abc1
Size: 24.69 kB - pcp-selinux-4.3.2-12.el7.x86_64.rpm
MD5: d12ac392efca4c8551029ab5294432ae
SHA-256: 94eceeebf21b2e5b3bbf0f8a7333d9ea7f03828d02396ab8d9a6caa68f3cc013
Size: 32.65 kB - pcp-system-tools-4.3.2-12.el7.x86_64.rpm
MD5: 055e013d028c396649203303ad8a434d
SHA-256: 90fd96834b8a326b53306b4fa46f6af9466f97c5f02abb55ca76d504e50a4735
Size: 175.38 kB - pcp-webapi-4.3.2-12.el7.x86_64.rpm
MD5: 443e20b6c07d618b3ef034fd1834f420
SHA-256: 2b4f22d0a2bd6a98cbe372ac054cddbf6b3e62674595fc304e62386dcfcf3ea6
Size: 133.00 kB - pcp-zeroconf-4.3.2-12.el7.x86_64.rpm
MD5: efd58d56082bf97430edb5e6c767945b
SHA-256: dbfa93ace49b98f9f156d085770ab6ed4f5d72f05cca88c2653ac93b80e69152
Size: 30.85 kB - perl-PCP-PMDA-4.3.2-12.el7.x86_64.rpm
MD5: d09605867adbecacb57c365de1ff43dc
SHA-256: 45c42a280277db71bff52a1a24d0d380525a21421d14f5e7e779ef8dabfaa122
Size: 62.08 kB - pcp-libs-4.3.2-12.el7.i686.rpm
MD5: a641b96cdbc9f7628dc841dbb0469197
SHA-256: a50daa97d7bb9752a4d523cc301565f9830c5d322a36f7c342a9dfa914aa6964
Size: 460.71 kB - python-pcp-4.3.2-12.el7.x86_64.rpm
MD5: 6dfa6b7d2550138c30eb69ba76763f9c
SHA-256: c7f1f750ececadb5e7565bb14a1e8b2d8c47deb52ef6110a06be015dd0630502
Size: 141.96 kB