EPSS
Percentile
20.2%
pcp is vulnerable to arbitrary code execution. A user is able to run code as root by including OS commands in /var/log/pcp/configs.sh.
/var/log/pcp/configs.sh
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index
access.redhat.com/errata/RHBA-2020:1628
bugzilla.suse.com/show_bug.cgi?id=1152763