从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:RHSA-2024:6344。 2. 发布日期:2024年9月19日。 3. 受影响的产品: - Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 - Red Hat Enterprise Linux Server - AUS 9.2 x86_64 - Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x - Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le - Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 - Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le - Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 - Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 - Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x 4. 安全漏洞类型: - pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) - pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) 5. 解决方案: - 可以通过访问以下链接获取详细解决方案:https://access.redhat.com/articles/11258 6. 受影响的组件: - BZ - 2310451 - CVE-2024-45770 pcp: pmpost symlink attack allows escalating pcp to root user - BZ - 2310452 - CVE-2024-45769 pcp: pmcd heap corruption through metric pmstore operations - RHEL-58305 - PCP pmcd.log fills /var filesystem with too many open files messages 7. CVE编号: - CVE-2024-45769 - CVE-2024-45770 这些信息可以帮助用户了解漏洞的详细情况、受影响的产品和组件,以及如何解决这些问题。