| 概要 | In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcp_v6_syn_recv_sock() Code in tcp_v6_syn_recv_sock() after the call to tcp_v4_syn_recv_sock() After tcp_v4_syn_recv_sock(), the child socket is already visible Since newinet->pinet6 is still pointing to the listener ipv6_pinfo Move the problematic code in tcp_v6_mapped_child_init() This allows the removal of one tcp_sync_mss(), since |
|---|---|
| 公表日 | 2026年5月6日21:16 |
| 登録日 | 2026年5月7日4:08 |
| 最終更新日 | 2026年5月6日22:07 |