Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10444
http://www.securityfocus.com/bid/14609
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2005-514.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.debian.org/security/2006/dsa-1018
http://www.debian.org/security/2006/dsa-1017
http://secunia.com/advisories/19374
http://secunia.com/advisories/19369
http://secunia.com/advisories/17826