Security Response Question #4833
Replies: 2 comments 1 reply
-
|
I agree. When an unpatched kernel issue is discovered, I look to Bottlerocket subject matter experts for advice on impact or mitigations. The discussion the week before was a valuable place to share insight into an emerging risk until patches became available. I second your potential solution. I only thought of checking the 'discussions' tab today. It's unclear where these discussions are supposed to take place. A colleague determined on Friday that this appears unexploitable (in our environment) in a default Ubuntu 24.04 container running on Bottlerocket 1.60. I had nowhere to share this insight, nor learn about potential conditions where people did manage to get this exploit working. |
Beta Was this translation helpful? Give feedback.
-
|
It appears CVE-2026-43284 (IPSec ESP module vulnerability) has been patched in the Linux Kernel and some operating systems have made releases. CVE-2026-43500 (RxRPC) is I can't find any details on expected release of an updated kernel for Bottlerocket OS just yet. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, it seems to me that the response to this issue here was not appropriate. Could you help clarify your recommendations and/or your security policy?
The issues with this I see are two:
I would love to hear your thoughts on this and appreciate any feedback. I understand that issues might not be the correct place and cause maintainers notifications fatigue. My main concern is that the community cannot continue to comment on the issue that was closed and has no guidance on where to go next.
Potential solution:
Beta Was this translation helpful? Give feedback.
All reactions