An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.
There was no shipped kernel version were seen affected with this problem. These files are not built in our source code.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):