The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10373
https://exchange.xforce.ibmcloud.com/vulnerabilities/26194
http://www.vupen.com/english/advisories/2006/1632
http://www.ubuntu.com/usn/usn-302-1
http://www.trustix.org/errata/2006/0024
http://www.securityfocus.com/bid/17806
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.13
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://secunia.com/advisories/21745
http://secunia.com/advisories/20716
http://secunia.com/advisories/20398
http://secunia.com/advisories/20237