A use-after-free vulnerability was found in the TCP IP protocol in the Linux Kernel, where a delete operation of the RCU-protected pointer is supposed to clear the pointer before the call_rcu()/synchronize_rcu() guarding the actual memory freeing. This flaw allows a local attacker to crash the system or leak kernel internal information.