DEBIAN-CVE-2026-43198
In the Linux kernel, the following vulnerability has been resolved: tcp: fix potential race in tcpv6synrecvsock() Code in tcpv6synrecvsock() after the call to tcpv4synrecvsock() is done too late. After tcpv4synrecvsock(), the child socket is already visible from TCP ehash table and other cpus might use it. Since newinet->pinet6 is still pointing to the listener ipv6pinfo bad things can happen as syzbot found. Move the problematic code in tcpv6mappedchildinit() and call this new helper from tcpv4synrecvsock() before the ehash insertion. This allows the removal of one tcpsyncmss(), since tcpv4synrecv_sock() will call it with the correct context.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://security-tracker.debian.org/tracker/CVE-2026-43198
