=== chris14_ is now known as chris14 | ||
TomyWork | hi, I'm trying to figure out if linux-image-unsigned-6.2.0-060200-generic version 6.2.0-060200.202302191831 is vulnerable to https://nvd.nist.gov/vuln/detail/CVE-2023-0461 . That kerneldance link returns https://gist.github.com/TomyLobo/0c68074d1df2c2b15e798cdf58110bee which uses a different version number scheme. I'm quite good with Git, so if I could just figure out which Git commit is associated with 6.2.0-060200.202302191831, I could figure | 18:58 |
---|---|---|
TomyWork | the rest out myself, probably. | 18:58 |
-ubottu:#ubuntu-kernel- There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CO... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461> | 18:58 | |
TomyWork | oooh, found a commit hash in a yaml file next to the .deb file in the repo: c3eb8d76ef307ea38c75ba95ce8dc9aa012531b6 | 19:04 |
TomyWork | I have a semi-related question: would you recommend for or against installing kernels from https://kernel.ubuntu.com/~kernel-ppa/mainline/ on a security-critical system? | 19:51 |
TomyWork | https://wiki.ubuntu.com/Kernel/MainlineBuilds ah the wiki recommends against it | 19:53 |
TomyWork | against any productive use, in fact | 19:53 |
Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!