[Deepin-Kernel-SIG] [linux 6.12-y] config: disable INET{6}_ESPINTCP#1740
Conversation
deepin inclusion category: bugfix Temporary disable these configs to mitigate this vulnerability from CVE-2026-46300. Signed-off-by: Wentao Guan <guanwentao@uniontech.com> (cherry picked from commit c7fae3b) Signed-off-by: Wentao Guan <guanwentao@uniontech.com>
Reviewer's guide (collapsed on small PRs)Reviewer's GuideTemporarily disables INET_ESPINTCP and INET6_ESPINTCP in Deepin’s 6.12-y kernel desktop defconfigs (arm64 and loongarch) to mitigate CVE-2026-46300. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Hey - I've left some high level feedback:
- Since the same INET{6}_ESPINTCP options are being toggled across multiple defconfigs, consider centralizing this as a shared config fragment or a documented helper so it’s easier to keep all architectures in sync when the mitigation is eventually reverted.
- Because this is a temporary mitigation for CVE-2026-46300, it may be useful to add a brief comment near the disabled config options in each defconfig indicating the CVE and that they should be reconsidered once an upstream fix is available.
Prompt for AI Agents
Please address the comments from this code review:
## Overall Comments
- Since the same INET{6}_ESPINTCP options are being toggled across multiple defconfigs, consider centralizing this as a shared config fragment or a documented helper so it’s easier to keep all architectures in sync when the mitigation is eventually reverted.
- Because this is a temporary mitigation for CVE-2026-46300, it may be useful to add a brief comment near the disabled config options in each defconfig indicating the CVE and that they should be reconsidered once an upstream fix is available.Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
|
Please remember to clean up this configuration item across all architectures after the release to maintain consistency. |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Avenger-285714 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Pull request overview
This PR temporarily disables ESP-in-TCP kernel config options in Deepin desktop defconfigs to mitigate the referenced CVE exposure.
Changes:
- Removes IPv4 and IPv6 ESP-in-TCP enablement from the LoongArch desktop defconfig.
- Removes IPv6 ESP-in-TCP enablement from the ARM64 desktop defconfig.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
arch/loongarch/configs/deepin_loongarch_desktop_defconfig |
Disables CONFIG_INET_ESPINTCP and CONFIG_INET6_ESPINTCP by removing their enabled entries. |
arch/arm64/configs/deepin_arm64_desktop_defconfig |
Disables CONFIG_INET6_ESPINTCP by removing its enabled entry. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
@opsiff gentle ping |
deepin inclusion
category: bugfix
Temporary disable these configs to mitigate this vulnerability from CVE-2026-46300.
(cherry picked from commit c7fae3b)
Summary by Sourcery
Temporarily disable ESP-in-TCP networking options in deepin desktop kernel configs to mitigate a security vulnerability.
Bug Fixes: