They say this may impact functions that use kernel cryptographic functions. For what it’s worth, the initcall_blacklist=crypto_authenc_esn_module_init is the one that made is so the released exploit python script didn’t work any longer YMMV.
To explain what you saw, rmmod attempts to remove a kernel module from your running system. It fails because that particular code is not a module on Rocky systems. Also, therefore the mitigation being suggested, dropping a configuration (.conf) file into /etc/modprobe.d, won’t work either, as what that tries to do is prevent the module from loading (returns nonzero to whatever invokes it, that’s what /bin/false does). Since, as above, on Rocky systems it’s “baked into” the kernel (and not a module), that technique is ineffectual.
Why is it taking so long? Other Linux distributions have already released the new bug-fix kernels, but Rocky Linux still hasn’t been patched. This is the first time I’ve truly felt that Rocky Linux users are in the minority.