The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
https://bugzilla.redhat.com/show_bug.cgi?id=714536
http://www.openwall.com/lists/oss-security/2011/06/20/16
http://www.openwall.com/lists/oss-security/2011/06/20/13
http://www.openwall.com/lists/oss-security/2011/06/20/1
http://rhn.redhat.com/errata/RHSA-2011-0927.html
http://patchwork.ozlabs.org/patch/100857/