CVE-2012-3430
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2012-3430 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
The Red Hat Security Response Team has rated this issue as having low security
impact. A future kernel updates may address this issue. For additional
information, refer to the Issue Severity Classification:
https://access.redhat.com/security/updates/classification/.
CVSS v2 metrics
| Base Score | 2.1 |
|---|---|
| Base Metrics | AV:L/AC:L/Au:N/C:P/I:N/A:N |
| Access Vector | Local |
| Access Complexity | Low |
| Authentication | None |
| Confidentiality Impact | Partial |
| Integrity Impact | None |
| Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2012:1491 | 2012-12-04 |
| Red Hat Enterprise Linux 5 (kernel) | RHSA-2012:1323 | 2012-10-02 |
| Red Hat Enterprise Linux 6 (kernel) | RHSA-2012:1304 | 2012-09-25 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise MRG 2.2 | realtime-kernel | Will not fix |
| Red Hat Enterprise MRG 2.1 | realtime-kernel | Not affected |
| Red Hat Enterprise Linux 4 | kernel | Will not fix |
Acknowledgements
This issue was discovered by the Red Hat InfiniBand team.CVE description copyright © 2017, The MITRE Corporation
