An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/afnetrom.c, there is a use-after-free because accept is also allowed for a successfully connected AFNETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAPNETADMIN capability.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32269.json"
[
{
"signature_type": "Line",
"target": {
"file": "net/netrom/af_netrom.c"
},
"deprecated": false,
"id": "CVE-2023-32269-3f14c723",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"137485694814311927415098382044514209781",
"80452818395291605864584553331829853434",
"300900359966191357575080357461998162043",
"19257832744589240106622850360311446620"
]
},
"source": "https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64"
},
{
"signature_type": "Function",
"target": {
"file": "net/netrom/af_netrom.c",
"function": "nr_listen"
},
"deprecated": false,
"id": "CVE-2023-32269-ce30651e",
"signature_version": "v1",
"digest": {
"function_hash": "269902965077821734102325418261231510637",
"length": 351.0
},
"source": "https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64"
}
]