There are some null-ptr-deref bugs in server_key.c in net/rxrpc/server_key.c in the latest kernel, unprivileged users can easily trigger it via ioctl. #Root Cause Some function calls are not implemented in rxrpc_no_security, there are preparse_server_key, free_preparse_server_key and destroy_server_key. When rxrpc security type is rxrpc_no_security, unprivileged users can easily trigger a null-ptr-deref bug via ioctl. So judgment should be added to prevent it
Hello, the CVE page https://access.redhat.com/security/cve/CVE-2022-1671 Statement paragraph says The affected code was not introduced into any kernel versions shipped with Red Hat Enterprise Linux making this vulnerable and not applicable to these platforms. Should that be "making this vulnerability not applicable" or something similar?