s390/entry: Scrub r12 register on kernel entry
Summary
| CVE | CVE-2026-31482 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:45 UTC |
| Updated | 2026-04-23 16:17:41 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
s390/entry: Scrub r12 register on kernel entry
Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"),
all entry handlers loaded r12 with the current task pointer
(lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That
commit removed TIF_ISOLATE_BP, dropping both the branch prediction
macros and the r12 load, but did not add r12 to the register clearing
sequence.
Add the missing xgr %r12,%r12 to make the register scrub consistent
across all entry points. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 a58d298a83a3a9b7ca99ded9d60a1e77231159ef git |
Not specified |
| CNA |
Linux |
Linux |
affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 git |
Not specified |
| CNA |
Linux |
Linux |
affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 7f4e3233faa8470dd0627bc49b2809f2bfebd909 git |
Not specified |
| CNA |
Linux |
Linux |
affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 git |
Not specified |
| CNA |
Linux |
Linux |
affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 0738d395aab8fae3b5a3ad3fc640630c91693c27 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.4 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.4 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/7f4e3233faa8470dd0627bc49b2809f2bfebd909 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0738d395aab8fae3b5a3ad3fc640630c91693c27 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a58d298a83a3a9b7ca99ded9d60a1e77231159ef |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.