First published: Tue Aug 16 2005(Updated: )
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =3.1 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0-test1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.6.0-test3 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0-test5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.6.0-test7 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.6-rc1 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.7-rc1 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.8-rc1 | |
Linux Kernel | =2.6.8-rc2 | |
Linux Kernel | =2.6.8-rc3 | |
Linux Kernel | =2.6.8.1 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.10-rc2 | |
Linux Kernel | =2.6.11 | |
Linux Kernel | =2.6.11-rc1 | |
Linux Kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.11-rc3 | |
Linux Kernel | =2.6.11-rc4 | |
Linux Kernel | =2.6.11.1 | |
Linux Kernel | =2.6.11.2 | |
Linux Kernel | =2.6.11.3 | |
Linux Kernel | =2.6.11.4 | |
Linux Kernel | =2.6.11.5 | |
Linux Kernel | =2.6.11.6 | |
Linux Kernel | =2.6.11.7 | |
Linux Kernel | =2.6.11.8 | |
Linux Kernel | =2.6.11_rc1_bk6 | |
Linux Kernel | =2.6.12-rc1 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6_test9_cvs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2555 is considered a high severity vulnerability due to its potential to allow unauthorized access and manipulation of socket policies by local users.
To fix CVE-2005-2555, it is advised to apply the latest patches or updates provided by your Linux distribution that address this vulnerability.
CVE-2005-2555 affects Linux kernel versions 2.6.x, including specific versions like 2.6.0 through 2.6.11.
The risks associated with CVE-2005-2555 include unauthorized access to modify network socket policies, which could lead to further exploits or system misconfigurations.
CVE-2005-2555 is a local vulnerability that requires access to the system by an authenticated user to exploit.