Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 3.1 |
||
linux linux kernel 2.6.11 |
||
linux linux kernel 2.6.8.1.5 |
||
linux linux kernel 2.6.12 |
||
linux linux kernel 2.6.11.2 |
||
linux linux kernel 2.6.5 |
||
linux linux kernel 2.6.1 |
||
linux linux kernel 2.6.11.8 |
||
linux linux kernel 2.6.11_rc1_bk6 |
||
linux linux kernel 2.6.10 |
||
linux linux kernel 2.6.11.6 |
||
linux linux kernel 2.6.0 |
||
linux linux kernel 2.6.3 |
||
linux linux kernel 2.6.4 |
||
linux linux kernel 2.6_test9_cvs |
||
linux linux kernel 2.6.11.5 |
||
linux linux kernel 2.6.7 |
||
linux linux kernel 2.6.2 |
||
linux linux kernel 2.6.8 |
||
linux linux kernel 2.6.11.3 |
||
linux linux kernel 2.6.6 |
||
linux linux kernel 2.6.9 |
||
linux linux kernel 2.6.11.7 |
||
linux linux kernel 2.6.8.1 |
||
linux linux kernel 2.6.11.4 |
||
linux linux kernel 2.6.11.1 |