[13:44] <Guest15> Hi, I would like to ask if anyone knows with why the patch for https://ubuntu.com/security/CVE-2023-32233 has not been released yet?
[13:44] -ubottu:#ubuntu-kernel- In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233>
[18:40] <sarnold> Guest15: I understand that the fixes for that issue are in https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/proposed2 -- at least for some of the kernels. you could try running it if you're not able to disable usernamespaces https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/proposed2 -- but know that these haven't finished QA yet
[19:57] <Guest15> sarnold: Thanks, i cannot disable this because i have K8S on Ubuntu 20.04. I only dont understand why patch for critical CVE took too long