CVE-2026-31482
s390/entry: Scrub r12 register on kernel entry
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: s390/entry: Scrub r12 register on kernel entry Before commit f33f2d4c7c80 ("s390/bp: remove TIF_ISOLATE_BP"), all entry handlers loaded r12 with the current task pointer (lg %r12,__LC_CURRENT) for use by the BPENTER/BPEXIT macros. That commit removed TIF_ISOLATE_BP, dropping both the branch prediction macros and the r12 load, but did not add r12 to the register clearing sequence. Add the missing xgr %r12,%r12 to make the register scrub consistent across all entry points.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 22, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < a58d298a83a3a9b7ca99ded9d60a1e77231159ef f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 7f4e3233faa8470dd0627bc49b2809f2bfebd909 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 f33f2d4c7c80c641f6ca3dfe5e7dfe1f91543780 < 0738d395aab8fae3b5a3ad3fc640630c91693c27
Linux / Linux
6.4
References
git.kernel.org: https://git.kernel.org/stable/c/a58d298a83a3a9b7ca99ded9d60a1e77231159ef git.kernel.org: https://git.kernel.org/stable/c/95c899cd791803a5bf7b73e5994fbbe1cc1a9c36 git.kernel.org: https://git.kernel.org/stable/c/7f4e3233faa8470dd0627bc49b2809f2bfebd909 git.kernel.org: https://git.kernel.org/stable/c/99a8b420f3f0e162eb9c9c9253929d4d23f9bd30 git.kernel.org: https://git.kernel.org/stable/c/0738d395aab8fae3b5a3ad3fc640630c91693c27