Vulnerability Name: | CVE-2012-4467 (CCN-79032) | ||||||||
Assigned: | 2012-10-04 | ||||||||
Published: | 2012-10-04 | ||||||||
Updated: | 2023-02-13 | ||||||||
Summary: | |||||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 6.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C) 4.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C/E:U/RL:OF/RC:C)
2.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2012-4467 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Linux Kernel GIT Repository compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c Source: CCN Type: oss-security: Petr Matousek | 4 Oct CVE Request -- kernel: compat: SIOCGSTAMP/SIOCGSTAMPNS incorrect order of arguments to compat_put_time[val|spec] Source: CCN Type: SA50790 Linux Kernel "compat_put_timeval()" Argument Passing Weakness Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-55785 Linux Kernel 'COMPAT_USE_64BIT_TIME' Multiple Local Denial of Service Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN kernel-compatputtimeval-dos(79032) Source: secalert@redhat.com Type: Exploit secalert@redhat.com | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |