An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability. CREATE(Triage):(User=admin) CVE-2023-32269 (https://nvd.nist.gov/vuln/detail/CVE-2023-32269)