An error within the INET socket monitoring feature when auditing the bytecode contained in certain netlink messages can be exploited to cause the kernel to enter an infinite loop via an INET_DIAG_BC_JMP opcode with the "yes" variable set to "0".
Original Advisory: http://thread.gmane.org/gmane.linux.network/197206/focus=197386 Solution: Fixed in version version 2.6.39.3 and 2.6.35.14 *** This bug has been marked as a duplicate of bug 374631 ***