In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 2.0.30 | 2.0.30.x |
linux / linux_kernel | 2.0.37 | 2.0.37.x |
linux / linux_kernel | 2.0.36 | 2.0.36.x |
linux / linux_kernel | 2.0.35 | 2.0.35.x |