Hi,

On Fri, Apr 03, 2026 at 10:16:15PM -0300, Benjamin Leon Dubos wrote:
> Source: linux
> Version: 6.19.10-1
> Severity: grave
> Tags: patch security
> X-Debbugs-Cc: [email protected], Debian Security Team 
> <[email protected]>
> 
> This is a backport for CVE-2026-23417 (BPF JIT Blinding bypass) 
> targeting the linux package in Sid (6.19.10-1).
> 
> I have verified the patch by successfully compiling kernel/bpf/core.o 
> in a Debian Sid environment. The patch follows DEP-3 standards and 
> addresses the issue where BPF_ST | BPF_PROBE_MEM32 instructions 
> were bypassing constant blinding.
> 
> The fix is based on the upstream commit by Linus Torvalds.
> Attached is the DEP-3 formatted patch.

Thanks for the patch (but it is not needed, as we follow stable
upstream series this is included in 6.19.11 which will be uploaded to
unstable).

I added a bug closer to the respective entry, but in general it's not
really needed to fill bugs for CVEs for the linux kernel, tracking of
the CVE is aleady almost well established.

Regards,
Salvatore

Reply via email to