CVE-2009-0065 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0065): Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
This is remotely exploitable and gives a Rootshell, see http://kernelbof.blogspot.com/2009/04/kernel-memory-corruptions-are-not-just.html SCTP is not enabled by default AFAIK, but we still might want to patch this a bit faster...
Already fixed in all hardened kernels.
RE Comment 2 - Indeed. Removing alias. PS: genpatches-2.6.27-11 added 2.6.27.13. genpatches-2.6.28-3 added 2.6.28.2. hardened-sources-2.6.25-r13 is unaffected as the patch was added independently in the preceding patchset.