=== chris14_ is now known as chris14
TomyWorkhi, I'm trying to figure out if linux-image-unsigned-6.2.0-060200-generic version 6.2.0-060200.202302191831 is vulnerable to https://nvd.nist.gov/vuln/detail/CVE-2023-0461 . That kerneldance link returns https://gist.github.com/TomyLobo/0c68074d1df2c2b15e798cdf58110bee which uses a different version number scheme. I'm quite good with Git, so if I could just figure out which Git commit is associated with 6.2.0-060200.202302191831, I could figure 18:58
TomyWorkthe rest out myself, probably.18:58
-ubottu:#ubuntu-kernel- There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CO... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461>18:58
TomyWorkoooh, found a commit hash in a yaml file next to the .deb file in the repo: c3eb8d76ef307ea38c75ba95ce8dc9aa012531b619:04
TomyWorkI have a semi-related question: would you recommend for or against installing kernels from https://kernel.ubuntu.com/~kernel-ppa/mainline/ on a security-critical system?19:51
TomyWorkhttps://wiki.ubuntu.com/Kernel/MainlineBuilds ah the wiki recommends against it19:53
TomyWorkagainst any productive use, in fact19:53

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!