In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Linux_kernel | Linux | 2.0.30 (including) | 2.0.30 (including) | 
| Linux_kernel | Linux | 2.0.35 (including) | 2.0.35 (including) | 
| Linux_kernel | Linux | 2.0.36 (including) | 2.0.36 (including) | 
| Linux_kernel | Linux | 2.0.37 (including) | 2.0.37 (including) |