=== chris14_ is now known as chris14 [18:58] hi, I'm trying to figure out if linux-image-unsigned-6.2.0-060200-generic version 6.2.0-060200.202302191831 is vulnerable to https://nvd.nist.gov/vuln/detail/CVE-2023-0461 . That kerneldance link returns https://gist.github.com/TomyLobo/0c68074d1df2c2b15e798cdf58110bee which uses a different version number scheme. I'm quite good with Git, so if I could just figure out which Git commit is associated with 6.2.0-060200.202302191831, I could figure [18:58] the rest out myself, probably. [18:58] -ubottu:#ubuntu-kernel- There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CO... [19:04] oooh, found a commit hash in a yaml file next to the .deb file in the repo: c3eb8d76ef307ea38c75ba95ce8dc9aa012531b6 [19:51] I have a semi-related question: would you recommend for or against installing kernels from https://kernel.ubuntu.com/~kernel-ppa/mainline/ on a security-critical system? [19:53] https://wiki.ubuntu.com/Kernel/MainlineBuilds ah the wiki recommends against it [19:53] against any productive use, in fact