CVE-2012-5532
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2012-5532 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v2 metrics
| Base Score | 2.1 |
|---|---|
| Base Metrics | AV:L/AC:L/Au:N/C:N/I:N/A:P |
| Access Vector | Local |
| Access Complexity | Low |
| Authentication | None |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat Enterprise Linux 5 (hypervkvpd) | RHSA-2013:0807 | 2013-05-09 |
| Red Hat Enterprise Linux Virtualization 5 (hypervkvpd) | RHSA-2013:0807 | 2013-05-09 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise Linux 6 | hypervkvpd | Not affected |
Acknowledgements
This issue was discovered by Florian Weimer of the Red Hat Product Security Team.CVE description copyright © 2017, The MITRE Corporation
