Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2024-41692 | A vulnerability was found in Performance Co-Pilot (PCP). This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash. | 
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 21 May 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 | 
Tue, 12 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 19 Sep 2024 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 | 
Thu, 19 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 19 Sep 2024 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus | |
| CPEs | cpe:/o:redhat:enterprise_linux:9 | cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/a:redhat:rhel_aus:8.4::appstream cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/a:redhat:rhel_e4s:8.4::appstream cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_e4s:9.0::appstream cpe:/a:redhat:rhel_eus:8.8::appstream cpe:/a:redhat:rhel_eus:9.2::appstream cpe:/a:redhat:rhel_tus:8.4::appstream cpe:/a:redhat:rhel_tus:8.6::appstream | 
| Vendors & Products | Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus | |
| References |  | 
 | 
Thu, 19 Sep 2024 11:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | threat_severity 
 | 
Thu, 19 Sep 2024 09:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability was found in Performance Co-Pilot (PCP). This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash. | |
| Title | Pcp: pmcd heap corruption through metric pmstore operations | |
| First Time appeared | Redhat Redhat enterprise Linux | |
| Weaknesses | CWE-787 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | |
| References |  | |
| Metrics | cvssV3_1 
 | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-07-24T13:19:09.847Z
Reserved: 2024-09-06T14:56:44.790Z
Link: CVE-2024-45769
Updated: 2024-09-19T13:39:47.643Z
Status : Awaiting Analysis
Published: 2024-09-19T09:15:02.343
Modified: 2024-11-12T18:15:35.427
Link: CVE-2024-45769
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.