[Deepin-Kernel-SIG] [linux 6.18-y] config: disable INET{6}_ESPINTCP #1741
Conversation
deepin inclusion category: bugfix Temporary disable these configs to mitigate this vulnerability from CVE-2026-46300. Signed-off-by: Wentao Guan <guanwentao@uniontech.com> (cherry picked from commit c7fae3b) Signed-off-by: Wentao Guan <guanwentao@uniontech.com>
Reviewer's guide (collapsed on small PRs)Reviewer's GuideTemporarily disables the INET_ESPINTCP and INET6_ESPINTCP kernel configuration options in Deepin’s arm64 and loongarch desktop defconfigs to mitigate CVE-2026-46300. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
|
Please remember to clean up this configuration item across all architectures after the release to maintain consistency. |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Avenger-285714 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Pull request overview
This pull request updates Deepin desktop kernel defconfigs to mitigate CVE-2026-46300 by disabling the ESP-in-TCP configuration options for IPv4/IPv6 IPsec.
Changes:
- Remove
CONFIG_INET_ESPINTCPfrom the LoongArch desktop defconfig. - Remove
CONFIG_INET6_ESPINTCPfrom the LoongArch and arm64 desktop defconfigs.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 2 comments.
| File | Description |
|---|---|
| arch/loongarch/configs/deepin_loongarch_desktop_defconfig | Stops forcing IPv4/IPv6 ESP-in-TCP on in the LoongArch desktop kernel config. |
| arch/arm64/configs/deepin_arm64_desktop_defconfig | Stops forcing IPv6 ESP-in-TCP on in the arm64 desktop kernel config. |
Comments suppressed due to low confidence (1)
arch/loongarch/configs/deepin_loongarch_desktop_defconfig:239
- Same as IPv4: removing CONFIG_INET6_ESPINTCP from the defconfig relies on current Kconfig defaults. To ensure the mitigation remains effective, explicitly disable it here (e.g., “# CONFIG_INET6_ESPINTCP is not set”).
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_ESP_OFFLOAD=m
CONFIG_INET6_IPCOMP=m
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| @@ -211,7 +211,6 @@ CONFIG_NET_FOU_IP_TUNNELS=y | |||
| CONFIG_INET_AH=m | |||
| CONFIG_INET_ESP=m | |||
| CONFIG_INET_ESP_OFFLOAD=m | |||
| @@ -299,7 +299,6 @@ CONFIG_IPV6_ROUTE_INFO=y | |||
| CONFIG_INET6_AH=m | |||
| CONFIG_INET6_ESP=m | |||
| CONFIG_INET6_ESP_OFFLOAD=m | |||
deepin inclusion
category: bugfix
Temporary disable these configs to mitigate this vulnerability from CVE-2026-46300.
(cherry picked from commit c7fae3b)
Summary by Sourcery
Disable INET and INET6 ESP-in-TCP options in desktop defconfigs to mitigate CVE-2026-46300 across supported architectures.
Bug Fixes:
Build: