Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation38 reference(s) from NVD