1) The "setsockopt()" function is not restricted to privileged users with the "CAP_NET_ADMIN" capability. This can be exploited to bypass IPsec policies or set invalid policies to exploit other vulnerabilities or exhaust available kernel memory.
2) An error in the "syscall32_setup_pages()" function on 64-bit x86 platforms can be exploited to cause a memory leak by executing a malicious 32-bit application with specially crafted ELF headers.
1) The vulnerability has been fixed in version 2.6.13-rc7.
2) The vulnerability has been fixed in version 2.6.13-rc4.
The link for this article located at Secunia is no longer available.