{"id":"CVE-2012-3419","details":"Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.","modified":"2026-01-27T04:11:17.553206Z","published":"2012-08-27T23:55:02Z","withdrawn":"2026-01-27T04:11:17.553206Z","related":["openSUSE-SU-2024:10165-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2533"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=841702"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html"},{"type":"WEB","url":"http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/08/16/1"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/15471040"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/15540133"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/15540172"}],"schema_version":"1.7.3"}