An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.
https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11