s390/syscalls: Add spectre boundary for syscall dispatch table
Summary
| CVE | CVE-2026-31483 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:45 UTC |
| Updated | 2026-04-23 16:17:41 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: s390/syscalls: Add spectre boundary for syscall dispatch table The s390 syscall number is directly controlled by userspace, but does not have an array_index_nospec() boundary to prevent access past the syscall function pointer tables. |
Risk And Classification
EPSS: 0.000300000 probability, percentile 0.086370000 (date 2026-04-24)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 3c3b97064764899c39a0abbd35a6caa031e70333 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 1cb9c7bc9025c637564fabc7fcc3c9343949e310 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 7a5260fbc6e79a1595328ec5c6aa3f937504a1f0 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d f8c444b918d639e1f9a621ee20fe481c1d10dfc4 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 87776f02449e3bded95b2ccbd6b012e9ae64e6f3 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 4d05dd18d867d58c6952a3bc260d244899da7256 git | Not specified |
| CNA | Linux | Linux | affected 56e62a73702836017564eaacd5212e4d0fa1c01d 48b8814e25d073dd84daf990a879a820bad2bcbd git | Not specified |
| CNA | Linux | Linux | affected 5.12 | Not specified |
| CNA | Linux | Linux | unaffected 5.12 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.131 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.80 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.21 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.11 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/48b8814e25d073dd84daf990a879a820bad2bcbd | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/1cb9c7bc9025c637564fabc7fcc3c9343949e310 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/3c3b97064764899c39a0abbd35a6caa031e70333 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/87776f02449e3bded95b2ccbd6b012e9ae64e6f3 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/7a5260fbc6e79a1595328ec5c6aa3f937504a1f0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/f8c444b918d639e1f9a621ee20fe481c1d10dfc4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/4d05dd18d867d58c6952a3bc260d244899da7256 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.