Description: A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to missing checks on SCTP chunk sizes in the SCTP-netfilter code and may result in an infinite loop exhausting system resources. Solution: Update to version 2.6.16.13 or later. http://kernel.org/ Provided and/or discovered by: Reported by the vendor. Original Advisory: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.13
Fixed in genpatches 2.6.16-9. Maintainers please bump: hardened-sources: johnm, hardened sh-sources: vapier (this is your bump reminder :P) suspend2-sources: brix xbox,xen-sources: chrb
Fixed in sys-kernel/suspend2-sources-2.6.16-r6.
All fixed, closing. vapier please bump sh-sources.