The two flaws apparently affects all kernels prior to 220.127.116.11.
CAN-2005-2492 is titled, "raw_sendmsg DoS" and could potentially lead to a memory read. According to the change log for 2.6.13, "The result of the read is not returned directly but you may be able to divine some information about it, or use the read to cause a crash on some architectures by reading."
CAN-2005-2490 is titled, "32bit sendmsg() flaw" which could allow for a local attacker to gain root privileges and execute arbitrary commands with those privileges.
$ uname -a
Linux spongebob 18.104.22.168 #1 Tue Sep 13 00:07:46 EST 2005 i686 GNU/Linux