[18:58] <TomyWork> hi, I'm trying to figure out if linux-image-unsigned-6.2.0-060200-generic version 6.2.0-060200.202302191831 is vulnerable to https://nvd.nist.gov/vuln/detail/CVE-2023-0461 . That kerneldance link returns https://gist.github.com/TomyLobo/0c68074d1df2c2b15e798cdf58110bee which uses a different version number scheme. I'm quite good with Git, so if I could just figure out which Git commit is associated with 6.2.0-060200.202302191831, I could figure 
[18:58] <TomyWork> the rest out myself, probably.
[18:58] -ubottu:#ubuntu-kernel- There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CO... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461>
[19:04] <TomyWork> oooh, found a commit hash in a yaml file next to the .deb file in the repo: c3eb8d76ef307ea38c75ba95ce8dc9aa012531b6
[19:51] <TomyWork> I have a semi-related question: would you recommend for or against installing kernels from https://kernel.ubuntu.com/~kernel-ppa/mainline/ on a security-critical system?
[19:53] <TomyWork> https://wiki.ubuntu.com/Kernel/MainlineBuilds ah the wiki recommends against it
[19:53] <TomyWork> against any productive use, in fact