Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html
lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html
lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html
oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6
www.debian.org/security/2012/dsa-2533
www.openwall.com/lists/oss-security/2012/08/16/1
bugzilla.redhat.com/show_bug.cgi?id=841702
hermes.opensuse.org/messages/15471040
hermes.opensuse.org/messages/15540133
hermes.opensuse.org/messages/15540172