๐Ÿ” CVE Alert

CVE-2026-31482

UNKNOWN 0.0

s390/entry: Scrub r12 register on kernel entry

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers loaded r12 with the current task pointer (lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That commit removed TIF_ISOLATE_BP, dropping both the branch prediction macros and the r12 load, but did not add r12 to the register clearing sequence. Add the missing xgr %r12,%r12 to make the register scrub consistent across all entry points.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < a58d298a83a3a9b7ca99ded9d60a1e77231159ef f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 7f4e3233faa8470dd0627bc49b2809f2bfebd909 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 0738d395aab8fae3b5a3ad3fc640630c91693c27
Linux / Linux
6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a58d298a83a3a9b7ca99ded9d60a1e77231159ef git.kernel.org: https://git.kernel.org/stable/c/95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 git.kernel.org: https://git.kernel.org/stable/c/7f4e3233faa8470dd0627bc49b2809f2bfebd909 git.kernel.org: https://git.kernel.org/stable/c/99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 git.kernel.org: https://git.kernel.org/stable/c/0738d395aab8fae3b5a3ad3fc640630c91693c27