s390/entry: Scrub r12 register on kernel entry

Summary

CVECVE-2026-31482
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-22 14:16:45 UTC
Updated2026-04-23 16:17:41 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers loaded r12 with the current task pointer (lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That commit removed TIF_ISOLATE_BP, dropping both the branch prediction macros and the r12 load, but did not add r12 to the register clearing sequence. Add the missing xgr %r12,%r12 to make the register scrub consistent across all entry points.

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 a58d298a83a3a9b7ca99ded9d60a1e77231159ef git Not specified
CNA Linux Linux affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 git Not specified
CNA Linux Linux affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 7f4e3233faa8470dd0627bc49b2809f2bfebd909 git Not specified
CNA Linux Linux affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 git Not specified
CNA Linux Linux affected f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 0738d395aab8fae3b5a3ad3fc640630c91693c27 git Not specified
CNA Linux Linux affected 6.4 Not specified
CNA Linux Linux unaffected 6.4 semver Not specified
CNA Linux Linux unaffected 6.6.131 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.80 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.21 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.11 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/7f4e3233faa8470dd0627bc49b2809f2bfebd909 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/0738d395aab8fae3b5a3ad3fc640630c91693c27 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/a58d298a83a3a9b7ca99ded9d60a1e77231159ef 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report