| Summary | In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp_v6_syn_recv_sock() Code in tcp_v6_syn_recv_sock() after the call to tcp_v4_syn_recv_sock() After tcp_v4_syn_recv_sock(), the child socket is already visible Since newinet->pinet6 is still pointing to the listener ipv6_pinfo Move the problematic code in tcp_v6_mapped_child_init() This allows the removal of one tcp_sync_mss(), since |
|---|---|
| Publication Date | May 6, 2026, 9:16 p.m. |
| Registration Date | May 7, 2026, 4:08 a.m. |
| Last Update | May 6, 2026, 10:07 p.m. |